Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017

Slides:



Advertisements
Similar presentations
School of Electrical and Computer Engineering ECE 400 Seminar Fall 2012.
Advertisements

Secure Operating Systems Lesson 1: Introductions and Expectations.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
CMPT 165 Introduction to Multimedia and the Internet
How to Prepare for the Fall Exam COM380/CIT304 Harry Erwin, PhD University of Sunderland.
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
Class 1: What this course is about. Assignments Reading: Chapter 1, pp 1-33 Do in Class 1: –Exercises on pages 13, 14, 22, 28 To hand in in Class 2: –Exercises.
MIS 470: Information Systems Project Yong Choi School of Business Administration CSU, Bakersfield.
CHEMISTRY 10123/10125 Spring 2007 Instructor: Professor Tracy Hanna Phone: Office: SWR 418
Computer Network Fundamentals CNT4007C
7-Sep-15 Physics 1 (Garcia) SJSU Conceptual Physics (Physics 1) Prof. Alejandro Garcia Spring 2007.
Syllabus CS 765: Introduction to Database Management Systems Fall 2008 Text Database Management Systems Ramakrishnan/Gehrke, 3rd.
CIS150AB: Object-Oriented Programming Fundamentals Instructor: Gary R. Smith, MS.
Organizational Database Management CIS 458 Introduction Sungchul Hong.
1 MSCS 237 Distributed Computing Spring 2006 INSTRUCTOR: Dr. Sheikh Iqbal Ahamed Office: Cudahy Hall 386 Phone: Office Hours: Monday 2:00-3:00pm.
WEEK-1 PRINCIPLES OF MANAGEMENT BUSN 107, Özge Can.
CSCE 727 Information Warfare
CST 229 Introduction to Grammars Dr. Sherry Yang Room 213 (503)
Database Management Systems I
MIS 300: Introduction to Management Information Systems Yong Choi School of Business Administration CSU, Bakersfield.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Slide 1 A Free sample background from © 2006 By Default! POLS4502 Gender and Ethnicity in International Relations Gregory C.
ECE 1100: Introduction to Electrical and Computer Engineering Wanda Wosik Associate Professor, ECE Dept. Notes 1 Spring 2011 Slides adapted from lectures.
MAT 360 – Lecture 0 Introduction. About me  Moira Chas   Work phone :  Office Location:
Author: Victor Rosenberg, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution 3.0.
January 16, 2007 COMS 4118 (Operating Systems I) Henning Schulzrinne Dept. of Computer Science Columbia University
Welcome To Econ 2020 Macro Economics Faculty: Dr. Munir Mahmud Office: Hazy 309 Phone: (435) Office Hours: MTW 9–10:30.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Scholarship Skills Andrew Black 1 Lecture 1 Scholarship Skills Andrew P Black Winter 2013 All material © 1996–2012 David Maier, Tim Sheard, Andrew Black,
BUS 4720 Supply and Demand in Small Businesses. Host and Application Security Lesson 1: Introductions and Expectations.
CS151 Introduction to Digital Design Noura Alhakbani Prince Sultan University, College for Women.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
Computer Networks CNT5106C
TYLER GROUP
Networking CS 3470, Section 1 Sarah Diesburg
Computer Network Fundamentals CNT4007C
Survey of English and Irish Literature:
Andy Wang Object Oriented Programming in C++ COP 3330
Lecture 1. Course Introduction
Welcome to CS 340 Introduction to Computer Networking
Networking CS 3470, Section 1 Sarah Diesburg
MKT 300 Research Methods in Business Mishari Alnahedh
Computer Networks CNT5106C
BCA Be respectful. Be responsible. Be Organized. Be successful.
CSC 135 section 60 or CSC Fall 2017.
Lecture 1. Course Introduction
Customer Service Mrs. Lynda palao Course syllabus Rm 312
CSC 111 Course orientation
College Prep United States History
Cpt S 471/571: Computational Genomics
Computer Networks CNT5106C
Andy Wang Object Oriented Programming in C++ COP 3330
CSCD 303 Essential Computer Security
COMS 161 Introduction to Computing
PHYS 202 Intro Physics II Catalog description: A continuation of PHYS 201 covering the topics of electricity and magnetism, light, and modern physics.
Networking CS 3470, Section 1 Sarah Diesburg
Plagiarism Damian Gordon.
Tonga Institute of Higher Education IT 141: Information Systems
CSCD 303 Essential Computer Security
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Computer Networks CNT5106C
T Information Security Technology
8th Advanced Science Be respectful. Be successful.
Tonga Institute of Higher Education IT 141: Information Systems
CSCD 303 Essential Computer Security
Steven M. Bellovin, Jason Healey, Evan Wolff Fall 2019
Presentation transcript:

Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017 COMS E6998-9, INAF U6518-001, Law L8989.00 — Cybersecurity: Technology, Policy and Law Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017

What is this Class? Cybersecurity is an obvious national security problem What do we do? Fix the technology? Pass laws? Negotiate with other countries? All of the above? Solving the problem is an interdisciplinary effort cybersec

The Legal Side How should the law cope with new technology? Computers and phones, and all they hold Encryption How can new technology help law enforcement? The Internet is international, with boundaries that aren’t apparent to people or apps cybersec

Policy How do things “cyber” affect and are affected by normal public policy and international affairs? What does “winning” mean in cyberspace? What are our “cyberrelations” with other countries? What are the norms for cyber espionage and conflict? Does deterrence work in cyberspace? Is that even the right question? cybersec

Technology How does all of this technology work? What are the technical underpinnings of the problems? Of the solutions? Are there things technology can’t do? Where is it going? Smartphones are ~10 years old, but they’ve completely changed the cybersecurity world. What happens next? cybersec

Who’s This Course For? You don’t have to be a budding lawyer—but you have to be willing to grapple with legal concepts You don’t have to know how to program—but you have to be willing to understand computers You don’t have to be a policy wonk—but you have to be willing to understand how all of this fits into existing policy frameworks cybersec

Course Structure Lecture with an ample helping of interaction—we want to hear from you Group projects plus presentation to the class No exams cybersec

Grading 50% Group paper: 15%: Initial scoping 35%: Final submission 30% Two short individual papers, one on each area (law, policy, tech) 20% Class participation cybersec

Groups Six people, two from each of the three schools You’re expected to contribute your area’s expertise Because of the groups, we want you to commit now to not dropping the course (and there’s a long wait list, so if you want to drop, drop now) cybersec

Possible Final Paper Topics Technical, policy, and legal norms to reduce intensity of cyber conflict Technical, policy, and legal actions to balance security and privacy Technical, policy, and legal actions to secure smart cities Technical, policy, and legal actions to secure networked medical devices Technical, policy, and legal actions to reduce identity theft and credit-card fraud Technical, policy, and legal actions to secure elections Technical, policy, and legal actions to secure financial transactions and institutions Technical, policy, and legal actions to find norms to reduce cyber espionage Technical, policy, and legal actions to secure the electrical grid Technical, policy, and legal considerations for vulnerability disclosure Technical, policy, and legal considerations for information operations. Critique or defend Microsoft’s proposal for a “cyber Geneva Convention” cybersec

Scoping Paper More or less three semi-independent sections Use perspectives and tools from each of the three areas to define the problem and possible solutions Find the fundamental references and literature About 2000 words We will put you in touch with professionals in the field cybersec

Final Paper About 6000 words An integrated whole—what is the problem, and how can it be solved? Due the Tuesday after the last class meeting cybersec

Academic Honesty Discussing homework with others is encouraged—but all programs and written material must be individual work unless otherwise instructed. Please use appropriate file permission mechanisms to protect your homework. (Looking at other people’s work is forbidden.) Zero tolerance for cheating Please see your school’s academic honesty policy cybersec

Citations You must cite to the appropriate literature Your quotations must be textually distinctive (e.g., in quotation marks or in a separate, indented paragraph) You must have a bibliography Note to law students: This need not be in precise Blue Book style Group papers should use a single citation style cybersec

Contacting Us We’re all busy and travel a lot We all like to meet with students Initial email contact is probably best, if only to make an appointment See the class web page for office hours cybersec

Responsibility You’re all adults You’re all responsible for your own actions If there’s a problem, you have to tell us cybersec