Lectures

Lectures

Lecture # Date Lecture Topic Class Notes Readings
Technology & Policy Overview
01 January 25 Introduction pdfImg
02 January 30 Policy Overview pdfImg
Readings:
  • Defending a New Domain: The Pentagon's Cyberstrategy,by William F. Lynn III, Foreign Affairs, September/October 2010

  • Optional Resources:
  • Under the Sea: The Vulnerability of the Commons, Foreign Affairs Magazine, January/February 2015 Issue.
  • Cyber-security: The vexed question of global rules, An independent report on cyber-preparedness around the world, February 2012. Read what 250 experts have to say about cybersecurity.
  • Cybersecurity - Two Years later, CSIS, 2011. (For 1st assignment this paper is part of the preceding one.)
  • Lessons from the First Great Cyberwar Era, A. M. Rutkowski, Info, Vol. 12, No. 1, February 2010.
  • 60 Minutes Show on Cyber War: Sabotaging the System 1:2, June 13, 2010. A minute video.
  • 03 February 1 Hardware and Software pdfImg
    Readings:
  • How the Internet Got Its Rules

  • Optional Resources:
  • A Tiny Computer Attracts a Million Tinkerers, by John Biggs of the New York Times.
  • 04 February 6 Hardware and Software Vulnerabilities pdfImg
    05 February 8 Internet Naming and Routing Protocols pdfImg
    Readings:
  • Chapter 6.1 of Introduction to Computer Security. Please use the password in class email to access. Chapter 6.1 required; the rest of the chapter for reference.
  • Understanding Autonomous Systems

  • Optional Resources:
  • Intro to BGP4, inter-AS routing
  • 06 February 13 Design and Operation of the Internet pdfImg
    Readings:
  • Beginner’s Guide to Internet Protocol (IP) Addresses
  • Packets, routers, and reliability
  • This is a six minute, 25 second video narrated by Vint Cerf, one of the Fathers of the Internet
    Security  
    07 February 15 Cyber Exploits pdfImg
      February 20 Long Weekend    
    08 February 22 Attribution and Privacy pdfImg
    Readings:
  • Attributing Cyber Attacks, Rid and Buchanan.
    Optional Resources:
  • Untangling Attribution, Clark and Landau, Procs. Workshop on Deterring Cyberattacks, National Research Council, 2010.
  • A Survey of Challenges in Attribution
  • New Brunswick licks identity management with virtual directory
  • The Dark Side of the Digital Revolution Examines the approach taken by autocratic governments to obtain control over Internet communications.
  • Amid cyberattacks, ISPs try to clean up the Internet, by Michael Kan, COMPUTERWORLD, February 23, 2017
  • 09 February 27 Major Cyber Attacks pdfImg
    10 March 1 Cyber Conflict pdfImg
    11 March 6 Secure Communications and Authorization pdfImg
    Economics
    12 March 8 Cyber Economics (Guest) pdfImg
    13 March 15 Bitcoin and Blockchains (Guest) pdfImg
    Student Press Conferences  
    14 March 13 Student Press Conferences    
    15 March 20 Student Press Conferences    
    16 March 22 Student Press Conferences    
    Internet Governance  
    17 April 3 The Cybercrime Convention pdfImg  
    18 April 5 Internet Governance I pdfImg
    19 April 10 Internet Governance II pdfImg
    20 April 12 International Norms Process pdfImg
    Contemporary Topics    
    21 April 17 Growing Risk of Strategic Surprise in Cyberspace (Guest)    
    22 April 19 Cyberwar Risks pdfImg
    Readings:
  • Thomas Rid. Think Again: Cyberwar, Foreign Policy, March/April, 2012
  • John Arquilla. Cyberwar Is Already Upon Us, Foreign Policy, March/April, 2012xs
  • Ellen Nakashima. U.S. accelerating cyberweapon research, Washington Post, March 18, 2012.
  • 2015 DoD Law of War Manual
  • Michael N. Schmitt. The Law of Cyber Warfare: Quo Vadis?
  • Optional Resources:
  • David Sanger. A Eureka Moment for Two Times Reporters: North Korea
  • 23 April 24 Engineering for Security pdfImg
    Readings:
  • Microsoft. Security Development Lifecycle
  • 23 April 24 Defense In Depth pdfImg
    Readings:
  • Rob Joyce. Disrupting Nation State Hackers (Video), USENIX Enigma 2016 Conference, January 2016
  • John Kindervag. Network Segmentation/Zero Trust(Video), paloalto Networks.
  • Getting Started with a Zero Trust Approach to Network Security, paloalto Networks