| |
| |
| |
Why cyberspace is wonderful | |
| |
| |
EL and complicated | |
| |
| |
What is cyberspace? | |
| |
| |
Why do people talk about the difference of a networked world? | |
| |
| |
How does the Internet actually work? | |
| |
| |
Who owns this thing? | |
| |
| |
Wait! You mean no one runs the internet? | |
| |
| |
What can governments do online? What are the limits of state power? | |
| |
| |
Just how dependent are we on cyberspace? | |
| |
| |
| |
Security and Insecurity Online | |
| |
| |
What do we mean by a "secure" system? | |
| |
| |
What is the difference between an attack on a network and an attack on a system? | |
| |
| |
How does anti-virus software work? | |
| |
| |
How do you defend a network? | |
| |
| |
Why is anonymity a problem online? Why is it relatively easy to act without accountability? | |
| |
| |
How can you authenticate some one to be sure they are who they say they are? | |
| |
| |
How do we keep data secure in cyberspace? | |
| |
| |
| |
Threats and Bad Actors | |
| |
| |
Differentiating threats | |
| |
| |
Value at risk | |
| |
| |
What are the bad guys after? What can you really do with a computer? | |
| |
| |
What's the worst you can do? Can a hacker really turn off the power grid? | |
| |
| |
Different motivations of attackers | |
| |
| |
Different types of attacks | |
| |
| |
What is Cyber Terrorism, actually? | |
| |
| |
What does "cyberwarfare" mean? | |
| |
| |
How are countries militarizing cyberspace? Why? | |
| |
| |
So if we just built better systems, could we have a secure internet? | |
| |
| |
| |
Case Studies / Examples of attacks | |
| |
| |
Aurora / Google (phishing, attribution) | |
| |
| |
Stuxnet (Critical infrastructure, intelligence) | |
| |
| |
Wikileaks data breach and fallout (data protection, Do | |
| |
| |
S)Israel-Syria Air Defense (Cyber-Kinetic Crossover, cyberwar) | |
| |
| |
| |
Why securing cyberspace is hard | |
| |
| |
What are some mechanisms that enable us to trust systems or data? | |
| |
| |
What is the difference between espionage and exploitation? | |
| |
| |
Why not just write better software? | |
| |
| |
Why can't network operators detect bad behavior? | |
| |
| |
Why security through obscurity doesn't work | |
| |
| |
How do we know what has happened after a cyber incident? | |
| |
| |
How does the rise in "cloud computing" change the dynamics of cyber security? | |
| |
| |
What makes mobile computing different? | |
| |
| |
If everyone's systems are vulnerable, can't defenders just interrupt the attacker's systems? | |
| |
| |
Why is it so hard to know who the attackers are? | |
| |
| |
Why does attribution matter? | |
| |
| |
How do we measure a cyber risk? | |
| |
| |
Why aren't users able to protect themselves? | |
| |
| |
Don't vendors and service providers have enough incentives to provide good security? | |
| |
| |
Why aren't companies investing enough to protect themselves? | |
| |
| |
| |
International Dimensions | |
| |
| |
What changes when cyber problems cross international borders? | |
| |
| |
How do countries differ in their approach to cyberspace? | |
| |
| |
Who has the biggest cyber armies? | |
| |
| |
What constitutes an act of war? | |
| |
| |
How does law enforcement deal with international boundaries? | |
| |
| |
What are existing international organizations currently doing? | |
| |
| |
Why don't the classic models of military deterrence work for cyberspace? | |
| |
| |
What are the obstacles to international cooperation to resolve cybersecurity issues? | |
| |
| |
| |
The path forward to a more secure cyberspace | |
| |
| |
It sounds like every aspect of modern life is vulnerable. Are things really that bad? | |
| |
| |
Why can't we just re-built the technology to prevent bad behavior? | |
| |
| |
Can we impose accountability through national control of cyberspace? | |
| |
| |
How can private firms be incentivized to internalize their risk? | |
| |
| |
If a company or government agency was willing to invest in cyber security defenses, what would stand in their way? | |
| |
| |
Can internet service providers do more to identity and stop bad behavior? | |
| |
| |
How can we make it harder for bad actors to profit from successful attacks | |
| |
| |
What can I do to protect myself? | |