Technology, Security, and Conflict in the Cyber Age IGA-236M, Harvard Kennedy School January 2015 Faculty: Professor James Waldo

Size: px
Start display at page:

Download "Technology, Security, and Conflict in the Cyber Age IGA-236M, Harvard Kennedy School January 2015 Faculty: Professor James Waldo"

Transcription

1 Course Description: Technology, Security, and Conflict in the Cyber Age IGA-236M, Harvard Kennedy School January 2015 Faculty: Professor James Waldo In our information age security policy, strategy, and management face exceptional challenges. The increasing reliance of modern society on networked computer systems creates unprecedented vulnerabilities coupled with open and simple pathways to exploit those vulnerabilities. Powerful nations are forced to adapt to a shrinking margin of safety. Today no nation, agency, industry, or firm is isolated from the new methods of harm: cyberwar, cyberespionage, cyberterrorism, and cybercrime. Traditional strategies and approaches to security need revision to apply to a world where threats can propagate instantaneously and where the identity or location of an adversary may not be known. Despite the magnitude of the problem, the field of cybersecurity strategy, policy, and management remains incipient. This course seeks to equip students with the tools necessary to conceptualize the cyber issue, develop policies appropriate for its resolution, and frame strategy and action to address the emerging threats. To that end, the course has four principal objectives: develop students understanding of the technical rudiments of cyberspace explore the nature of emergent and future cyber threats evaluate strategies and policy responses to these threats build professional skills in group work, scenario assessment, and memo writing No computer science background is required: a core aim of the course is to make the related technology comprehensible to a layperson. Students with technical expertise may find the course useful in developing an understanding of key issues in the strategic management of cybersecurity for the organizations of industry and government. Requirements and Grading: 1. Class Participation: Every student is expected to be prepared for and attend every class. Participation is important; it will count for 30% of your overall grade 2. Individual Policy Papers and Briefs: There will be daily writing assignments, some of which are produced by each student. These papers will count for 20% of your overall grade 3. Group Policy Papers and Briefs: Some of the daily writing assignments will be given to groups of students, organized by the instructors. These papers will count for 20% of your overall grade 1

2 4. Final Group Project: On the last day of class, we will have a table-top simulation that will require a number of policy and position papers and briefings, all done as part of a group. This will count for 30% of the grade. Course Schedule (Note: Guest Speakers are Tentative and Subject to Change): Monday : Code as a Weapon 1.) United States. Executive Office of the President. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communication Infrastructure. May ) Committee on Offensive Information Warfare, National Research Council. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press, Preface and Synopsis. Available Online: 3.) Symantec. Symantec Internet Security Threat Report: Trends for Vol. 16 (April 2011). Report_04-11_HI-RES.pdf 4.) Ken Thompson. Reflections on Trusting Trust. Communication of the ACM (Aug. 1984): ) Janet Abbate. Inventing the Internet. Cambridge: MIT Press, Chapter 1: White Heat and Coldwar: The Origins and Meanings of Packet Switching, Chapter 2: Building the ARPANET: Challenges and Strategies, and Chapter 4: From ARPANET to Internet. 6.) Nicolas Falliere, Liam O Murchu, and Eric Chien. W32.Stuxnet Dossier, Version 1.4. February tuxnet_dossier.pdf 1.) Center for Strategic and International Studies. Securing Cyberspace for the 44 th Presidency. Dec

3 2.) W. Brian Arthur. Increasing Returns and Path Dependence in the Economy. Ann Arbor, MI: University of Michigan Press, ) Susan Leigh Star. The Ethnography of Infrastructure. American Behavioral Scientist (1999) 43: ) Paul A. David. Clio and the Economics of QWERTY. The American Economic Review 75.2 (1985): Tuesday : A Networked World 1.) Steven M. Bellovin, Scott O. Bradner, Whitfield Diffie, Susan Landau, and Jennifer Rexford. Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure. Harvard National Security Journal. 3.1 (2011): _Bellovin_Bradner_Diffie_Landau_Rexford1.pdf 2.) Fred Schneider and Deirdre Mulligan. Doctrine for Cybersecurity. Daedalus. Fall 2011, ) Vivek Kundra. Federal Cloud Computing Strategy. Feb ; ) United States. Government Accountability Office (GAO). Information Security: Additional Guidance Needed to Address Cloud Computing Concerns. Oct ) Tyler Moore, Richard Clayton, and Ross Anderson. The Economics of Online Crime. Journal of Economic Perspectives (2009): ) J.H. Saltzer, D.P.Reed, and D.D. Clark. End-to-End Arguments in System Design. ACM Transactions in Computer Systems. 2.4 (Nov. 1984):

4 7.) David D. Clark and Marjory S. Blumenthal. Rethinking the Design of the Internet: The End to End Arguments vs. the Brave New World. (2000). 1.) Scott D. Sagan. The Limits of Safety: Organizations, Accidents, and Nuclear Weapons. Princeton, NJ: Princeton UP, ) Charles Perrow. Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton UP, 1984/1999. Introduction, and Chapter 3: Complexity, Coupling, and Catastrophe. 3.) Charles Perrow. The Next Catastrophe: Reducing Our Vulnerability to Natural, Industrial, and Terrorist Disasters. Princeton, NJ: Princeton UP, 2007/ ) Philip Auerswald, et al. Seeds of Disaster, Roots of Response. Oxford UP: ) Langdon Winner. Complexity, Trust and Terror. NetFuture #137, October 22, Wednesday: Asymmetry and Authentication 1.) David D. Clark and Susan Landau. Untangling Attribution. National Security Journal (2011). 2.) Committee on Offensive Information Warfare, National Research Council. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. Washington, DC: National Academies Press, Chapter 5: Perspectives on Cyberattack Outside National Security. 3.) Orin S. Kerr. Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes. New York University Law Review (2003). 4.) Steptoe Cyberblog. The Hackback Debate. Nov. 2,

5 5.) An Introduction to Cryptography. (1999). ftp://ftp.pgpi.org/pub/pgp/6.5/docs/english/introtocrypto.pdf 6.) Tor. Wikipedia. 1.) Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. Authentication in Distributed Systems: Theory and Practice. ACM Transactions in Computer Systems (Nov. 1992): Thursday : Cyberwar 1.) Richard Clarke and Robert Knake. Cyber War: The Next Threat to National Security and What to Do About It. Ecco, ) John Arquilla. Cyberwar Is Already Upon Us. Foreign Policy. March/April, ) United States. Department of Defense. Department of Defense Strategy for Operating in Cyberspace. July ) Joseph Nye. Nuclear Lessons for Cyber Security. Strategic Studies Quarterly Winter ) Thomas Rid. Cyber War Will Not Take Place. Journal of Strategic Studies. 35:1 (2012): ) David Sanger. Confront and Conceal: Obama s Secret Wars and Surprising Use of American Power. New York: Crown, Prologue and Chapter 8. 7.) Harold Koh. International Law in Cyberspace. USCYBERCOM Inter-Agency Legal Conference. Sept. 18,

6 1.) United States. Department of Defense. Department of Defense Cyberspace Policy Report. Nov %20Report_For%20webpage.pdf 2.) Bill Gertz. Computer-Based Attacks Emerge as Threat of Future, General Says. Washington Times. Sept. 3, ) Jack Goldsmith. Cybersecurity Treaties: A Skeptical View. Hoover Institution ) Thomas Mahnken. Why Cyberwar Isn t the Warfare You Should Worry About. Foreign Policy. July ) Committee on Deterring Cyberattacks, National Research Council. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington, DC: National Academies Press, ) Thomas Rid. Think Again: Cyberwar. Foreign Policy. March/April, Available Online: 7.) Michael N. Schmitt. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transportation Law. (1999). 8.) Kenneth Anderson. Readings: Harold Koh Lays Out US Government Position on Cyberspace and International Law. Lawfare. Sept. 19, ) Paul Rosenzweig. The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence Draft. No assigned readings Friday : Table-Top Activity 6

Class Organization. Class participation is required and will be taken into account in final grading.

Class Organization. Class participation is required and will be taken into account in final grading. Cybersecurity: The Challenges of Securing Cyberspace Leonard Bailey and Kimberley Raleigh, Adjunct Professors Georgetown University Law Center Spring 2015 (Edited 3/21/15) Class meets for two hours on

More information

Cybersecurity and Privacy. Boston University, CS591/IR. Instructor: Timothy H. Edgar

Cybersecurity and Privacy. Boston University, CS591/IR. Instructor: Timothy H. Edgar Cybersecurity and Privacy Boston University, CS591/IR Instructor: Timothy H. Edgar Cyber conflict poses unique challenges for governments, citizens, and the future of the Internet. The United States has

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Train Like You Will Fight

Train Like You Will Fight Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content

More information

Cyber-Intelligence and Cyber-Espionage

Cyber-Intelligence and Cyber-Espionage London First Cyber-Intelligence and Cyber-Espionage Roundtable 23 October 2013 Sponsored and Hosted by Avanta CONTENTS Executive Summary Introduction Cyber-Warfare: The Emerging Frontier I. CASCADING FAILURE

More information

Cyber Conflict. Professor Robert Axelrod axe@umich.edu. SPP 750.001, Winter 2014 TuTh 8:30-10, 1220 Weill Hall Office Hours Tu 2-4

Cyber Conflict. Professor Robert Axelrod axe@umich.edu. SPP 750.001, Winter 2014 TuTh 8:30-10, 1220 Weill Hall Office Hours Tu 2-4 Cyber Conflict Professor Robert Axelrod axe@umich.edu SPP 750.001, Winter 2014 TuTh 8:30-10, 1220 Weill Hall Office Hours Tu 2-4 This course examines how cyberspace, particularly the Internet, can serve

More information

Political Science 5020-101 PRO-SEMINAR IN INTERNATIONAL RELATIONS THEORY Fall 2007 Tuesday 6:15-9:00 pm OLC 1131

Political Science 5020-101 PRO-SEMINAR IN INTERNATIONAL RELATIONS THEORY Fall 2007 Tuesday 6:15-9:00 pm OLC 1131 1 Political Science 5020-101 PRO-SEMINAR IN INTERNATIONAL RELATIONS THEORY Fall 2007 Tuesday 6:15-9:00 pm OLC 1131 Dr. Ryan Office: OLC 2055 Phone: 262-6348 E-mail: ryanc@appstate.edu Website: http://www.pscj.appstate.edu/faculty/ryan.html

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

The main object of my research is :

The main object of my research is : The main object of my research is : «War» I try to analyse the mutual impacts between «new wars» and the evolution of the international system More especially my research is about what we call»cyber-war«or»cyber-conflicts«is

More information

National Security in Today s World July 7-11, 2003

National Security in Today s World July 7-11, 2003 The Yale International Summer Institute 2003 National Security in Today s World July 7-11, 2003 PROGRAM Institute Director: Institute Assistant: Student Assistants: Janet Headley Kathy Sulkes Lexie Detmer

More information

NATIONAL DEFENSE AND SECURITY ECONOMICS

NATIONAL DEFENSE AND SECURITY ECONOMICS NATIONAL DEFENSE AND SECURITY ECONOMICS FUTURE DEVELOPMENT OF ECONOMICS OF DEFENSE AND SECURITY ECONOMIC DIMENSION OF CYBERSPACE AS NEW SECURITY THREAT Content of Topic Introduction Basic Concepts Cyberspace

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October 2013. Author note A Community Position paper on Law of CyberWar Paul Shaw 12 October 2013 Author note This law and cyberwar paper / quasi-treatise was originally written for a course in a CISO certification curriculum,

More information

CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT

CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT Joeli R. Field INTL604 Interagency Operations American Military University September 18, 2010 2 INTRODUCTION The cyber threat is one of

More information

Values 291 ETHICS IN SCIENCE University of Washington, Seattle Winter 2013: MWF 2:30 3:20, Savery 130 Course website: canvas.uw.

Values 291 ETHICS IN SCIENCE University of Washington, Seattle Winter 2013: MWF 2:30 3:20, Savery 130 Course website: canvas.uw. Values 291 ETHICS IN SCIENCE University of Washington, Seattle Winter 2013: MWF 2:30 3:20, Savery 130 Course website: canvas.uw.edu Instructor of Record: Co-Instructor: Laura Harkewicz, Ph.D., Lecturer

More information

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines Academic Calendars Term I (20081) Term II (20082) Academic Calendars Term III (20083) Weekend College International Student Admission Deadlines Final Examination Schedule Broward Community College Catalog

More information

Brief Biographical Sketch

Brief Biographical Sketch Department of Political Science University of California, Davis Davis, California 95616 (530) 752-2262 E-mail: mnincic@ucdavis.edu Present Position Brief Biographical Sketch Miroslav Nincic Professor of

More information

INTRODUCTION TO URBAN & ENVIRONMENTAL PLANNING UP 423 / ARCH 423 / NRE 370 / ENVIRON 370 Fall 2003

INTRODUCTION TO URBAN & ENVIRONMENTAL PLANNING UP 423 / ARCH 423 / NRE 370 / ENVIRON 370 Fall 2003 Urban and Regional Planning Program College of Architecture & Urban Planning The University of Michigan INTRODUCTION TO URBAN & ENVIRONMENTAL PLANNING Professor: Richard K. Norton 1248C A&AB 936-0197 /

More information

Survey of Cyber Security Frameworks

Survey of Cyber Security Frameworks Survey of Cyber Security Frameworks Alice Nambiro Wechuli (Department of Computer Science, Masinde Muliro University of Science and Technology, Kenya alicenambiro@yahoo.com) Geoffrey Muchiri Muketha (Department

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

POS 598 Reflexivity in Science and Governance

POS 598 Reflexivity in Science and Governance POS 598 Reflexivity in Science and Governance Professor Clark A. Miller Office: Social Sciences 235B Phone: 480-965-1778 Email: clark.miller@asu.edu T, Th 10:40-11:55 am Coor 6601 3 credits Course Description

More information

Obama s Cybersecurity Plan

Obama s Cybersecurity Plan SECURITY TECHNOLOGY POLICY PAPERS SERIES 1 Spring 10 Obama s Cybersecurity Plan Marianne STONE Geest-MSH - Paris Sciences Po Paris Columbia University, School of International and Public Affairs New York

More information

How To Understand And Understand Cyber Security

How To Understand And Understand Cyber Security Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009 Two recent studies National Academies Study: Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

BEN 600 ETHICAL ISSUES IN ENGINEERING AND RESEARCH. Fall 2012. MW 12:45 2:05 Bowne 414

BEN 600 ETHICAL ISSUES IN ENGINEERING AND RESEARCH. Fall 2012. MW 12:45 2:05 Bowne 414 BEN 600 ETHICAL ISSUES IN ENGINEERING AND RESEARCH Fall 2012 MW 12:45 2:05 Bowne 414 Instructor: Prof. Dana Radcliffe Office: CST 4-106L Telephone: 729-9195 Office hours: MW 10:45 12:15 and by appointment

More information

CSE598k / CSE545 Advanced Network Security

CSE598k / CSE545 Advanced Network Security CSE598k / CSE545 Advanced Network Security Lecture 1 - Introduction Prof. Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) 1 Oops... 2 Network Security No really good definition,

More information

The Stuxnet Worm The Nexus of Cyber Security and International Policy. By George Aquila george.aquila@tufts.edu Mentor: Ming Chow

The Stuxnet Worm The Nexus of Cyber Security and International Policy. By George Aquila george.aquila@tufts.edu Mentor: Ming Chow The Stuxnet Worm The Nexus of Cyber Security and International Policy By George Aquila george.aquila@tufts.edu Mentor: Ming Chow 1 Abstract: This paper focuses on the Stuxnet worm as an example of the

More information

Society s Dependence on Information Systems

Society s Dependence on Information Systems Chapter 10 Society s Dependence on Information Systems . Contents Page Introduction **..*. ***. **, * * * e *.. *,..... *. *. * *., *,............... 97 Failure **** *.** * *.. * * *... * *.... *.. * *

More information

International University of Monaco 12/04/2012 12:50 - Page 1. Monday 30/01 Tuesday 31/01 Wednesday 01/02 Thursday 02/02 Friday 03/02 Saturday 04/02

International University of Monaco 12/04/2012 12:50 - Page 1. Monday 30/01 Tuesday 31/01 Wednesday 01/02 Thursday 02/02 Friday 03/02 Saturday 04/02 International University of Monaco 12/04/2012 12:50 - Page 1 Master in Finance - Private Banking and International - from 30/01/12 to 04/02/12 Monday 30/01 Tuesday 31/01 Wednesday 01/02 Thursday 02/02

More information

GAO HOMELAND DEFENSE. U.S. Northern Command Has a Strong Exercise Program, but Involvement of Interagency Partners and States Can Be Improved

GAO HOMELAND DEFENSE. U.S. Northern Command Has a Strong Exercise Program, but Involvement of Interagency Partners and States Can Be Improved GAO United States Government Accountability Office Report to Congressional Requesters September 2009 HOMELAND DEFENSE U.S. Northern Command Has a Strong Exercise Program, but Involvement of Interagency

More information

2014 2015 University-Wide Academic Calendar

2014 2015 University-Wide Academic Calendar 2014 2015 University-Wide Academic Calendar Guide to Abbreviations UGD = Undergraduate Day GS = Graduate Schools LAW = School of Law CPS = College of Professional Studies Sunday Monday Tuesday Wednesday

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

How To Become A Computer Scientist

How To Become A Computer Scientist PROFESSIONAL SUMMARY Brian R. Salmans 1024 Summerfield Way Lawrence, KS 66049 334 652 9777 brian.salmans@ku.edu Over 25 years of leadership and management experience in Department of Defense-level computer

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

MASTER OF PROFESSIONAL STUDIES

MASTER OF PROFESSIONAL STUDIES MASTER OF PROFESSIONAL STUDIES IN THE FIELD OF SECURITY AND SAFETY LEADERSHIP OFFERED BY THE GEORGE WASHINGTON UNIVERSITY COLLEGE OF PROFESSIONAL STUDIES CLASSES HELD AT: THE GW GRADUATE EDUCATION CENTER,

More information

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & International Relations Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey. Cybersecurity & IR This part of the IWOSI aims to link the Information

More information

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities GAO United States Government Accountability Office Report to Congressional Requesters May 2011 DEFENSE DEPARTMENT CYBER EFFORTS More Detailed Guidance Needed to Ensure Military Services Develop Appropriate

More information

2013 2014 University-Wide Academic Calendar

2013 2014 University-Wide Academic Calendar 2013 2014 University-Wide Academic Calendar Guide to Abbreviations UGD = Undergraduate Day GS = Graduate Schools LAW = School of Law CPS = College of Professional Studies Aug 26 Monday LAW: Fall semester

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

Graduate Student Leadership Certificate Program Pilot 2011-12

Graduate Student Leadership Certificate Program Pilot 2011-12 Graduate Student Leadership Certificate Program Pilot 2011-12 Program facilitators: Tyrus Miller, Vice Provost and Dean of Graduate Studies, and Jim Moore, Assistant Dean of Graduate Studies All sessions

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

Security is Not a Commodity: The Road Forward for Cybersecurity Research

Security is Not a Commodity: The Road Forward for Cybersecurity Research Security is Not a Commodity: The Road Forward for Cybersecurity Research Stefan Savage UC San Diego Fred B. Schneider Cornell University Version 4: February 3, 2009 1 Computers at Risk 2, a 1991 report

More information

U.S. National Cybersecurity

U.S. National Cybersecurity U.S. National Cybersecurity Martin Casado Keith Coleman Sponsored by William J. Perry MS&E 91SI Fall 2006 Stanford University Why are we talking about cybersecurity? Case 1: Blue Security DoS May 2006,

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

NATO & Cyber Conflict: Background & Challenges

NATO & Cyber Conflict: Background & Challenges NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented

More information

September 10, 2015. Dear Administrator Scott:

September 10, 2015. Dear Administrator Scott: September 10, 2015 Tony Scott United States Chief Information Officer Administrator, Office of Electronic Government and Information Technology Office of Management and Budget 725 17th Street, NW Washington,

More information

Course Description: 1) Health insurance

Course Description: 1) Health insurance MEC 400G / 500I: Economic Issues and the Management of Healthcare Professor Gautam Gowrisankaran John M. Olin School of Business Washington University in St. Louis Fall 2005 Introduction: The purpose of

More information

CYBER SECURITY FOUNDATION - OUTLINE

CYBER SECURITY FOUNDATION - OUTLINE CYBER SECURITY FOUNDATION - OUTLINE Cyber security - Foundation - Outline Document Administration Copyright: QT&C Group Ltd, 2014 Document version: 0.2 Author: N R Landman (MD and Principal Consultant)

More information

2015 2016 University-Wide Academic Calendar

2015 2016 University-Wide Academic Calendar 2015 2016 University-Wide Academic Calendar Guide to Abbreviations UGD = Undergraduate day GS = Graduate schools LAW = School of Law CPS = College of Professional Studies SEM = Semeter programs (undergraduate

More information

The Honorable Boyce F. Martin, JR., Circuit Judge United States Court of Appeals, Sixth Circuit Law Clerk (Sept. 1983-Sept. 1984)

The Honorable Boyce F. Martin, JR., Circuit Judge United States Court of Appeals, Sixth Circuit Law Clerk (Sept. 1983-Sept. 1984) Tracey Maclin EDUCATION Tufts University, Medford, MA Bachelor of Arts in Political Science, May 1980 Graduated magna cum laude Activities: Big Brother Association of Boston Intercollegiate Football Columbia

More information

Symantec Cyber Security Services: A Recipe for Disaster

Symantec Cyber Security Services: A Recipe for Disaster When On-The-Job Training Is a Recipe for Disaster How security simulation prepares IT staff for APTs, breaches and data leakages Contents Sometimes On-The-Job Training Is a Lousy Idea... 2 On-The-Job Training

More information

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy

The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy The Case for Support: The Center for Cyber Security Studies at the U. S. Naval Academy Computer and network security threats of the future are of concern today, and new strategies are required to ensure

More information

NASDAQ DUBAI TRADING AND SETTLEMENT CALENDAR 2015. 1. On US Federal Reserve Holidays, no settlements will take place for USD.

NASDAQ DUBAI TRADING AND SETTLEMENT CALENDAR 2015. 1. On US Federal Reserve Holidays, no settlements will take place for USD. NASDAQ Dubai Circular No. : 65/14 Date of Issue : December 22 nd 2014 Date of Expiry : Upon issue of replacement Circular NASDAQ DUBAI TRADING AND SETTLEMENT CALENDAR 2015 Issued pursuant to the NASDAQ

More information

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392)

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) (HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) VISIT: WWW.TTCUS.COM (HTTP://WWW.TTCUS.COM /? HSTC=40060925.4FE4E58F02ECBE9D993453E16A8EB373.1374161815407.1374161815407.1374161815407.1&

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

Understanding Cyber Defense A Systems Architecture Approach

Understanding Cyber Defense A Systems Architecture Approach NDIA 12th Annual Systems Engineering Conference, San Diego, CA, 26-29 Oct 2009 Understanding Cyber Defense A Systems Architecture Approach Tom McDermott Director of Research Georgia Tech Research Institute

More information

Politics of Environmental, Health, and Safety Regulation Professor Brendon Swedlow Northern Illinois University

Politics of Environmental, Health, and Safety Regulation Professor Brendon Swedlow Northern Illinois University Politics of Environmental, Health, and Safety Regulation Professor Brendon Swedlow Northern Illinois University 1. Course Description The planet is warming, species are dying, and cancer and terrorists

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

Economic Bases of Power: The Study of Political Economy of National Security

Economic Bases of Power: The Study of Political Economy of National Security Course Time: Th 2:00-5:00pm Email: cappella@bu.edu Course Location: SED205 Office: Political Science 303 Office Hours: Tuesdays 3-5 Economic Bases of Power: The Study of Political Economy of National Security

More information

Worm Was Perfect for Sabotaging Centrifuges By WILLIAM J. BROAD and DAVID E. SANGER

Worm Was Perfect for Sabotaging Centrifuges By WILLIAM J. BROAD and DAVID E. SANGER Page 1 of 5 Reprints This copy is for your personal, noncommercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers here or use the "Reprints"

More information

CTE Teacher Preparation Class Schedule 2015-2016. Career and Technical Education Business and Industry Route Teacher Preparation Program

CTE Teacher Preparation Class Schedule 2015-2016. Career and Technical Education Business and Industry Route Teacher Preparation Program 2015-2016 Career and Technical Education Business and Industry Route Teacher Preparation Program Bates Technical College offers training that prepares individuals with business and industry experience

More information

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,

More information

Introduction to Security

Introduction to Security to Security Guest Lecture: CS329E Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: October 14, 2010 at 08:59 Slideset 1: 1 What Does Security Mean? We re interested

More information

Hybrid Warfare & Cyber Defence

Hybrid Warfare & Cyber Defence Hybrid Warfare & Cyber Defence Maj Gen Thomas FRANZ, DEU AF SHAPE DCOS CIS & CD Characteristics of Hybrid Warfare Alternate means to achieve goals Lines blurred between: state-onstate wars, counterinsurgency

More information

GEORGIA STATE UNIVERSITY (SCHOOL OF PUBLIC ADMINISTRATION)

GEORGIA STATE UNIVERSITY (SCHOOL OF PUBLIC ADMINISTRATION) GEORGIA STATE UNIVERSITY (SCHOOL OF PUBLIC ADMINISTRATION) GEORGIA STATE UNIVERSITY SCHOOL OF PUBLIC ADMINISTRATION AND URBAN STUDIES PAdm/US 836 - Emergency Management Summer Quarter 1994 Instructor:

More information

GAO CYBERSECURITY. Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative

GAO CYBERSECURITY. Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative GAO United States Government Accountability Office Report to Congressional Requesters March 2010 CYBERSECURITY Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National

More information

An Overview of Large US Military Cybersecurity Organizations

An Overview of Large US Military Cybersecurity Organizations An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United

More information

How To Teach Cyber Security

How To Teach Cyber Security RPAD 545 445 Principles and Practices of Cyber Security Course Summary: Our world is more connected today than it has ever been in our history. Tomorrow we will be more connected than we are at this very

More information

Disaster and Crisis Management in the Public, Private and Nonprofit Sectors RPAD 572/472 Instructor: Terry Hastings

Disaster and Crisis Management in the Public, Private and Nonprofit Sectors RPAD 572/472 Instructor: Terry Hastings Disaster and Crisis Management in the Public, Private and Nonprofit Sectors RPAD 572/472 Instructor: Terry Hastings Course Description Natural disasters, acts of terrorism, and industrial accidents are

More information

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

College of Architecture & Urban Planning The University of Michigan. Arch 509 006 Hospital Design + Health Fall 2015

College of Architecture & Urban Planning The University of Michigan. Arch 509 006 Hospital Design + Health Fall 2015 College of Architecture & Urban Planning The University of Michigan Arch 509 006 Hospital Design + Health Fall 2015 Professor: Jean Wineman 3118 A&AB / 763 1497 / jwineman@umich.edu Office Hours: Monday

More information

Collateral Effects of Cyberwar

Collateral Effects of Cyberwar Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global

More information

UN Emergency Summit on Cyber Security Topic Abstract

UN Emergency Summit on Cyber Security Topic Abstract UN Emergency Summit on Cyber Security Topic Abstract Dear Delegates and Moderators, Welcome to the UN Emergency Summit on Cyber Security! Cyber security is one of the most relevant issues in the international

More information

The Importance of Knowing Your Case Study

The Importance of Knowing Your Case Study : THE EDUCATION INDUSTRY Spring 2010. Tuesdays, 3:15-6:15 (Evanston Campus) April 7, 2010 (replaces syllabus in course reader) Professor Spiro Maroulis Chambers Hall, RM 112 Evanston Campus (@ SW corner

More information

Public Policy - A Review of the Program

Public Policy - A Review of the Program Public Policy Evaluation 93696 - P SC 74000 GC 3 credits The Graduate Center, CUNY Professor Janet C. Gornick FALL 2008 ----------------------------------------------------------------------------------------------------------------------------------

More information

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY CYBER HYGIENE AND ORGANIZATIONAL PLANNING ARE AT LEAST AS INTEGRAL TO SECURING INFORMATION NETWORKS AS FIREWALLS AND ANTIVIRUS SOFTWARE Cybersecurity

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies

More information

The George Washington University Graduate School of Political Management Summer 2013

The George Washington University Graduate School of Political Management Summer 2013 The George Washington University Graduate School of Political Management Summer 2013 PSC250 Homeland Security Policy Mondays, Wednesdays 6-8pm Hall of States Kevin J. Fandl, JD, PhD Phone: 202-725-5305

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Eighth International Forum «State, Civil Society and Business Partnership on International Information Security» and

Eighth International Forum «State, Civil Society and Business Partnership on International Information Security» and Draft: April, 14 A GENDA Eighth International Forum «State, Civil Society and Business Partnership on International Information Security» and Ninth Scientific Conference of the International Information

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

COURSE SYLLABUS Employee Selection and Succession Management Human Resources Design 351 SUMMER, 2006 Module II

COURSE SYLLABUS Employee Selection and Succession Management Human Resources Design 351 SUMMER, 2006 Module II COURSE SYLLABUS Employee Selection and Succession Human Resources Design 351 SUMMER, 2006 Module II Claremont GRADUATE UNIVERSITY HRD 351: Employee Selection and Succession Class Dates: Class Hours: Thursdays

More information

International Relations: Theory and Practice IGA-101

International Relations: Theory and Practice IGA-101 Syllabus Spring 2008 The Harvard Kennedy School International Relations: Theory and Practice IGA-101 Class Time: Monday & Wednesday, 1:10pm 2:30pm Location: Land (Belfer Building, 4 th floor) The first

More information

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness United States Government Accountability Office Report to Congressional Committees September 2013 FEDERAL INFORMATION SECURITY Mixed Progress in Implementing Program Components; Improved Metrics Needed

More information

University of Maryland Cybersecurity Center (MC 2 )

University of Maryland Cybersecurity Center (MC 2 ) University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge

More information

Department of Political Science

Department of Political Science California State University, San Bernardino 1 Department of Political Science Department of Political Science Social and Behavioral Sciences Building, Room 112 (909) 537-5535 Department of Political Science

More information

The Homeland Security and Preparedness College of The NJ-OHSP

The Homeland Security and Preparedness College of The NJ-OHSP The Homeland Security and Preparedness College of The NJ-OHSP Presented By Paul J. Lioy, Ph.D. Executive Committee of the College and Deputy Director of the Environmental and Occupational Health Sciences

More information

Contemporary Security Studies

Contemporary Security Studies SUB Hamburg B/120487 Contemporary Security Studies THIRD EDITION Edited by Alan Collins OXFORD UNIVERSITY PRESS Notes on Contributors List of Figures List of Tables List of Boxes Guided Tour of Learning

More information

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government

More information

Intelligence Analysis for Homeland Security RPAD 557

Intelligence Analysis for Homeland Security RPAD 557 Intelligence Analysis for Homeland Security RPAD 557 Instructor: Dr. James E. Steiner Public Service Professor Rockefeller College SUNY Albany 518-708-4183 Office hours: by appointment 423 State Street

More information