Lectures

Lectures

Lecture # Date Lecture Topic Class Notes Readings
Technology & Policy Overview
01 January 24 Introduction pdfImg
02 January 29 Policy Overview pdfImg
Readings:
  • Defending a New Domain: The Pentagon's Cyberstrategy,by William F. Lynn III, Foreign Affairs, September/October 2010

  • Optional Resources:
  • Under the Sea: The Vulnerability of the Commons, Foreign Affairs Magazine, January/February 2015 Issue.
  • Cyber-security: The vexed question of global rules, An independent report on cyber-preparedness around the world, February 2012. Read what 250 experts have to say about cybersecurity.
  • Cybersecurity - Two Years later, CSIS, 2011. (For 1st assignment this paper is part of the preceding one.)
  • Lessons from the First Great Cyberwar Era, A. M. Rutkowski, Info, Vol. 12, No. 1, February 2010.
  • 60 Minutes Show on Cyber War: Sabotaging the System 1:2, June 13, 2010. A minute video.
  • 03 January 31 Hardware and Software pdfImg
    Readings:
  • How the Internet Got Its Rules
  • How a 22-Year-Old Discovered the Worst Chip Flaws in History by Jeremy Kahn, Alex Webb, and Mara Bernath, Bloomberg Technology, January 17, 2018
  • What He Did on His Summer Break: Exposed a Global Security Flaw by Isabella Kwai, The New York Times, January 30, 2018

  • Optional Resources:
  • A Tiny Computer Attracts a Million Tinkerers, by John Biggs of the New York Times.
  • Computer Architecture
  • 04 February 5 Hardware and Software Vulnerabilities pdfImg
    05 February 7 Internet Naming and Routing Protocols pdfImg
    Readings:
  • Chapter 6.1 of Introduction to Computer Security. Please use the password in class email to access. Chapter 6.1 required; the rest of the chapter for reference.
  • Understanding Autonomous Systems

  • Optional Resources:
  • Intro to BGP4, inter-AS routing
  • 06 February 12 Design and Operation of the Internet pdfImg
    Readings:
  • Beginner's Guide to Internet Protocol (IP) Addresses
  • Packets, routers, and reliability
  • This is a six minute, 25 second video narrated by Vint Cerf, one of the Fathers of the Internet
    Security  
    07 February 14 Cyber Exploits pdfImg
      February 19 Long Weekend    
    08 February 21 Attribution and Privacy pdfImg
    Readings:
  • Attributing Cyber Attacks, Rid and Buchanan.
    Optional Resources:
  • Untangling Attribution, Clark and Landau, Procs. Workshop on Deterring Cyberattacks, National Research Council, 2010.
  • A Survey of Challenges in Attribution
  • New Brunswick licks identity management with virtual directory
  • The Dark Side of the Digital Revolution Examines the approach taken by autocratic governments to obtain control over Internet communications.
  • Amid cyberattacks, ISPs try to clean up the Internet, by Michael Kan, COMPUTERWORLD, February 23, 2017
  • 09 February 26 Major Cyber Attacks pdfImg
    10 February 28 Secure Communications and Authorization pdfImg
    11 March 5 Cyber Conflict pdfImg
    Economics
    12 March 7 Cyber Economics pdfImg
    13 March 12 Bitcoin and Blockchains pdfImg
    Internet Governance  
    14 March 14 Transborder Cybercrime pdfImg  
    15 March 19 Careers in Cyber Security, Holly Ridgeway (Guest) pdfImg
    16 March 21 Internet Governance pdfImg
    17 April 2 International Norms Process pdfImg
    Contemporary Topics
    18 April 4 Social Media and Propaganda pdfImg  
    19 April 9 AI and Ethics pdfImg  
    20 April 11 Engineering for Security pdfImg
    Readings:
  • Microsoft. Security Development Lifecycle
  • 21 April 16 Growing Risk of Strategic Surprise in Cyberspace (Guest)    
    22 April 18 Defense in Depth pdfImg
    Readings:
  • Thomas Rid. Think Again: Cyberwar, Foreign Policy, March/April, 2012
  • John Arquilla. Cyberwar Is Already Upon Us, Foreign Policy, March/April, 2012xs
  • Ellen Nakashima. U.S. accelerating cyberweapon research, Washington Post, March 18, 2012.
  • 2015 DoD Law of War Manual
  • Michael N. Schmitt. The Law of Cyber Warfare: Quo Vadis?
  • Optional Resources:
  • David Sanger. A Eureka Moment for Two Times Reporters: North Korea
  • 23 April 23 The Role of Intelligence and Information Sharing in Cyber (Guest)    
    23 April 25 Future Directions pdfImg
    Readings:
  • Rob Joyce. Disrupting Nation State Hackers (Video), USENIX Enigma 2016 Conference, January 2016
  • John Kindervag. Network Segmentation/Zero Trust(Video), paloalto Networks.
  • Getting Started with a Zero Trust Approach to Network Security, paloalto Networks