C Lectures - CSCI 1800

2020 Lectures & Readings


Lecture # Date Lecture Topic Class Notes Readings
Technology & Policy Overview
01 January 22 Introduction pdfImg
02 January 27 Policy Overview pdfImg
(Compare and contrast themes b/w U.S. administrations)
  • International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World, by The White House, May 2011
  • National Cyber Strategy of the United States of America, by The White House, September 2018
  • Lucas Kello, The Meaning of the Cyber Revolution: Perils to Theory and Statecraft International Security 2013

  • Optional Resources:
  • The West's Crisis of Confidence by Carl Bildt, Project Syndicate, April 19, 2018
  • Under the Sea: The Vulnerability of the Commons, Foreign Affairs Magazine, January/February 2015 Issue.
  • Trump Us Cyber Diplomacy
  • Lessons from the First Great Cyberwar Era, A. M. Rutkowski, Info, Vol. 12, No. 1, February 2010.
  • 60 Minutes Show on Cyber War: Sabotaging the System 1:2, June 13, 2010. A minute video.
  • 03 January 29 Intro to Hardware and Software pdfImg
  • How the Internet Got Its Rules
  • How a 22-Year-Old Discovered the Worst Chip Flaws in History by Jeremy Kahn, Alex Webb, and Mara Bernath, Bloomberg Technology, January 17, 2018
  • What He Did on His Summer Break: Exposed a Global Security Flaw by Isabella Kwai, The New York Times, January 30, 2018

  • Optional Resources:
  • A Tiny Computer Attracts a Million Tinkerers, by John Biggs of the New York Times.
  • Computer Architecture
  • 04 February 3 Hardware and Software Vulnerabilities pdfImg
    05 February 5 The Role of Intelligence and Information Sharing
    Mike Steinmetz, President, Digital Executive and
    Director and General Partner, College Hill Ventures (Guest)
    06 February 10 Design and Operation of the Internet pdfImg
  • Beginner's Guide to Internet Protocol (IP) Addresses
  • Packets, routers, and reliability
  • This is a six minute, 25 second video narrated by Vint Cerf, one of the Fathers of the Internet
    07 February 12 Internet Naming and Routing Protocols pdfImg
  • Chapter 6.1 of Introduction to Computer Security. Please use the password in class email to access. Chapter 6.1 required; the rest of the chapter for reference.
  • Understanding Autonomous Systems

  • Optional Resources:
  • Intro to BGP4, inter-AS routing
  •   February 18 Long Weekend    
    08 February 19 Cyber Exploits pdfImg
    09 February 24 Attribution and Privacy pdfImg
  • Attributing Cyber Attacks, Rid and Buchanan.
  • Beyond Attribution: Seeking National Responsibility for Cyber Attacks, Jason Healey, 2011 (Originally published in the Brown Journal of World Affairs)
  • A Guide to Cyber Attribution, Office of the Director of Nat'l Intelligence, September 2018 [4 Pages]

  • Optional Resources:
  • A Survey of Challenges in Attribution
  • The Dark Side of the Digital Revolution Examines the approach taken by autocratic governments to obtain control over Internet communications.
  • 10 February 26 Major Cyber Attacks pdfImg
  • Stuxnet and the Limits of Cyber Warfare by Jon R. Lindsay, Security Studies, August 2013
  • Inside Project Raven
  • USA Karma
  • Web War I: The Cyberattack that Changed the World.

  • Optional Resources:
  • Significant Cyber Incidents CSIS' large database of prominent cyber attacks since 2006.
  • APT1: Exposing One of China's Cyber Espionage Units, Mandiant, 2013.
  • Advanced Persistent Threats: A Symantec Perspective, Symantec
  • Exploit Kits published by F-Secure.
  • SON OF STUXNET: The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus by Kim Zetter, The Intercept, November 12, 2014
  • 11 March 2 Secure Communications and Authorization pdfImg
    12 March 4 Cyber Conflict pdfImg
    13 March 9 Bitcoin and Blockchains pdfImg
    14 March 11 Cyber Economics pdfImg
    15 March 16 Canceled
    Internet Governance  
    16 March 30 Transborder Issues pdfImg
    17 April 1 Internet Governance pdfImg
  • Milton L. Mueller. Network and States: The Global Politics of Internet Governance, pp.1-13.
  • Joseph S. Nye, Jr. The Regime Complex for Managing Global Cyber Activities.
  • Matthias Spielkamp. Internet governance - why you should care.
  • Bruce W. McConnell & John E. Savage. Exploring Multi-Stakeholder Internet Governance. Follow download link. Read pp.2-10.

  • Optional Resources:
  • Nationalistic Hierarchies vs Multi-stakeholder Networks.
  • ICANN, Russia, China and Internet Reform.
  • The Clarifying Lawful Overseas Use of Data (CLOUD) Act, signed into law in March 2018, is explained in this article by the Electronic Privacy Information Center (EPIC).
  • The WIRED Guide to Data Breaches by Lily Hay Newman, Wired, December 7, 2018
  • GDPR impact complex, expert warns by Warwick Ashford, Computer Weekley, November 15, 2017
  • Cross-Border Data Sharing Under the CLOUD Act
  • What is net neutrality
  • 18 April 6 International Norms Process pdfImg
    Contemporary Topics
    19 April 8 Social Media and Propaganda pdfImg
    20 April 13 AI and Ethics pdfImg
    21 April 15 Engineering for Security pdfImg
  • Making Security Sustainable by Ross Anderson, Communications of the ACM, Vol. 61 No. 3, Pages 24-26, 2018
  • Cybersecurity's Human Factor: Lessons from the Pentagon by James A. Winnefeld Jr., Christopher Kirchhoff, and David M. Upton, Harvard Business Review, September 2015
  • Rethinking Cybersecurity: Strategy, Mass Effect, and States by James Andrews Lewis, Center for Strategic and International Studies, January 9, 2018 Security Development Lifecycle
  • OWASP Top Ten: Surviving in the cyber wilderness By Peter Loshin, TechTarget, December 7, 2017
  • 22 April 20 Defense in Depth pdfImg
  • Thomas Rid. Think Again: Cyberwar, Foreign Policy, March/April, 2012
  • John Arquilla. Cyberwar Is Already Upon Us, Foreign Policy, March/April, 2012xs
  • Ellen Nakashima. U.S. accelerating cyberweapon research, Washington Post, March 18, 2012.
    Video Resources:
  • NSA TAO Chief on Disrupting Nation State Hackers by Rob Joyce, USENIX Enigma Conference, January 28 2016 (34:55 minutes)

  • Optional Resources:
  • 2015 DoD Law of War Manual [1200+ Pages -- for reference only]
  • David Sanger. A Eureka Moment for Two Times Reporters: North Korea
  • 23 April 22 Future Directions pdfImg
  • Alternate Cybersecurity Futures, The Atlantic Council, 2019
  • Diversity in Cybersecurity, by John Knight, Jack Davidson, Anh Nguyen-Tuong, Jason Hiser, and Michele Co, Computer, 2016
  • Shuffler: Fast and Deployable Continuous Code Re-Randomization by King, Gobieski, Williams-King, Blake, Yuan, Colp, Zheng, Kermerlis, Yang and Aiello, OSDI, 2016
  • 21 April 13 Cyber Threats: Minds and Machines Both At Risk,
    Vinh Nguyen, National Intelligence Council (Guest)