DOC PREVIEW
UW CSEP 590 - Syllabus

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Eric Norman, LLNL: Cargo screening technologies.September 28: Profiling the Terrorist AdversaryOctober 5: Computer Security PrimerOctober 19: Nuclear, Radiological & Chemical WeaponsOctober 26: Biological Weapons; Remediation and Recovery TechnologiesNovember 30: US Interrogation Policy and the War on TerrorHomeland Security / Cyber SecurityAutumn 2005N.B. CONTINUALLY IN FLUXVersion 24: November 22Course Requirements:Red Team Exercise (~25%): You are a member of a 5-6 person team of engineers and policy professionals that has been hired by the Department of Homeland Security to 1) test cyber-security vulnerabilities in the US economy, and 2) recommend appropriate policy responses (if any). The team must conduct its investigation and write a 3-7 page report summarizing its findings and recommendations.White Paper (~55%): Groups of 3-5 students will provide a comprehensive report describing a particular threat, assessing possible losses in the event of an attack, assessing current vulnerabilities, presenting possible responses, and evaluating the cost-effectiveness of each.Wiki (~20%): Most class discussion in this course will be conducted on-line using a Wiki. Students will be graded on the quantity and, especially, quality of their participation. Lectures:BERKELEY ONLY: August 31 – September 21August 31: The Logic of TerrorismModern terrorism has been with us since the 1870s. What can history teach us about the strategy,tactics, and limits of terrorism?Steve Maurer, UC Berkeley: What Can History Teach Us?Readings:Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21.September 7: Terrorism as WarfareHistorically, nation states were the only entities that could credibly make war. Have new technologies and the vulnerabilities of modern life changed the rules?Steve Maurer, UC Berkeley: Can Terrorism Challenge the Nation State?Readings:Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21.September 13 (Tuesday): The Al Qaida ThreatCan US foreign policy discourage rogue nations from putting WMD into the hands of terrorists?Michael Nacht, UC Berkeley: Post 9/11 Diplomacy: The Bush Doctrine, Rogue Nations, and US Non-Proliferation PolicyReadings:Online Bush Doctrine Memo. http://www.whitehouse.gov/nsc/nss.htmlSeptember 21: Technology Policy and the War on TerrorCan new technologies improve current trade-offs between civil liberties and security? How do homeland security experts use Threat, Vulnerability, and Consequence (TVC) models to identify and protect society’s most critical assets?Don Prosnitz, LLNL: Security and Civil Liberties: Can Technology Improve the Balance?Steve Maurer, UC Berkeley: The Bioshield Dilemma: Developing New Technologies at an Affordable PriceEric Norman, LLNL: Cargo screening technologies.Readings:Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21.Steve Maurer, “When Patents Fail: Finding New Drugs for the Developing World,” May 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/Maurer_When_Patents_Fail.pdf (pdf)UW AND UCSD JOIN: September 28 – December 7September 28: Profiling the Terrorist AdversaryWhat are the motives and capabilities of current terrorist groups? How likely are they to use WMD or attack the nation’s cyber-infrastructure?Gary Ackerman & Jeffrey Bale, Monterey Institute: Profiling the Terrorist AdversaryReadings:Jeffrey M. Bale and Gary Ackerman. Recommendations on the Development of Methodologies and Attributes for Assessing Terrorist Threats of WMD Terrorism. Center for Nonproliferation Studies, Monterey Institute of International Studies. http://www.cs.washington.edu/education/courses/csep590/05au/readings/Bale_Ackerman_FinalReport.pdf (pdf).October 5: Computer Security PrimerComprehensive introduction to basic computer security principles, mechanisms, and approaches.Essentially, the highlights of an undergraduate computer security course, reduced to 3 hours.Geoff Voelker, UCSDReadings: Ken Thompson, “Reflections on Trusting Trust,” Communications of the ACM 27(8), August 1984. http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdfAlma Whitten and J.D. Tygar, “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,” Proc. USENIX Security Symposium, August 1999. http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdfRoss Anderson, “Why Cryptosystems Fail,” Communications of the ACM 37(11), November 1994. http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdfOctober 12: Cyber Security In-The-LargeUsing information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructureEd Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and BeyondPhil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and RiskyKirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of SeattleErnie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of SeattleReadings:Information Technology for Counterterrorism. Computer Science & Telecommunications Board,National Research Council, 2003. http://www7.nationalacademies.org/cstb/pub_counterterrorism.html. Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4.Cyber Security: A Crisis of Prioritization. President’s Information Technology Advisory Committee, 2005. http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf (pdf). Washington Post articles on cyber terrorism, August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/New York Times article, “The Rise of the Digital Thugs,” August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.htmlTime article, “The Invasion of the Chinese Cyberspies,” September 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htmCIO Magazine article, “The Sky Really Is Falling,” October 2005. http://www.cio.com/archive/100105/qa_lazowska.htmlOctober 19: Nuclear, Radiological & Chemical WeaponsRichard A. Muller, UC Berkeley and LBNL: The


View Full Document

UW CSEP 590 - Syllabus

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Syllabus
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Syllabus and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Syllabus 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?