DOC PREVIEW
UW CSEP 590 - Syllabus

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Homeland Security / Cyber Security Autumn 2005 N.B. CONTINUALLY IN FLUX Version 24: November 22 Course Requirements: Red Team Exercise (~25%): You are a member of a 5-6 person team of engineers and policy professionals that has been hired by the Department of Homeland Security to 1) test cyber-security vulnerabilities in the US economy, and 2) recommend appropriate policy responses (if any). The team must conduct its investigation and write a 3-7 page report summarizing its findings and recommendations. White Paper (~55%): Groups of 3-5 students will provide a comprehensive report describing a particular threat, assessing possible losses in the event of an attack, assessing current vulnerabilities, presenting possible responses, and evaluating the cost-effectiveness of each. Wiki (~20%): Most class discussion in this course will be conducted on-line using a Wiki. Students will be graded on the quantity and, especially, quality of their participation. Lectures: BERKELEY ONLY: August 31 – September 21 August 31: The Logic of Terrorism Modern terrorism has been with us since the 1870s. What can history teach us about the strategy, tactics, and limits of terrorism? Steve Maurer, UC Berkeley: What Can History Teach Us? Readings: Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21. September 7: Terrorism as Warfare Historically, nation states were the only entities that could credibly make war. Have new technologies and the vulnerabilities of modern life changed the rules? Steve Maurer, UC Berkeley: Can Terrorism Challenge the Nation State?Readings: Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21. September 13 (Tuesday): The Al Qaida Threat Can US foreign policy discourage rogue nations from putting WMD into the hands of terrorists? Michael Nacht, UC Berkeley: Post 9/11 Diplomacy: The Bush Doctrine, Rogue Nations, and US Non-Proliferation Policy Readings: Online Bush Doctrine Memo. http://www.whitehouse.gov/nsc/nss.html September 21: Technology Policy and the War on Terror Can new technologies improve current trade-offs between civil liberties and security? How do homeland security experts use Threat, Vulnerability, and Consequence (TVC) models to identify and protect society’s most critical assets? Don Prosnitz, LLNL: Security and Civil Liberties: Can Technology Improve the Balance? Steve Maurer, UC Berkeley: The Bioshield Dilemma: Developing New Technologies at an Affordable Price Eric Norman, LLNL: Cargo screening technologies. Readings: Walter Laqueur, No End to War: Terrorism in the Twenty-First Century (2004) (text; Amazon.com). Please read this text in three segments, concluding 9/21. Steve Maurer, “When Patents Fail: Finding New Drugs for the Developing World,” May 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/Maurer_When_Patents_Fail.pdf (pdf) UW AND UCSD JOIN: September 28 – December 7 September 28: Profiling the Terrorist Adversary What are the motives and capabilities of current terrorist groups? How likely are they to use WMD or attack the nation’s cyber-infrastructure? Gary Ackerman & Jeffrey Bale, Monterey Institute: Profiling the Terrorist AdversaryReadings: Jeffrey M. Bale and Gary Ackerman. Recommendations on the Development of Methodologies and Attributes for Assessing Terrorist Threats of WMD Terrorism. Center for Nonproliferation Studies, Monterey Institute of International Studies. http://www.cs.washington.edu/education/courses/csep590/05au/readings/Bale_Ackerman_FinalReport.pdf (pdf). October 5: Computer Security Primer Comprehensive introduction to basic computer security principles, mechanisms, and approaches. Essentially, the highlights of an undergraduate computer security course, reduced to 3 hours. Geoff Voelker, UCSD Readings: Ken Thompson, “Reflections on Trusting Trust,” Communications of the ACM 27(8), August 1984. http://www.cse.ucsd.edu/users/voelker/cse291/fa05/thompson-trust-cacm84.pdf Alma Whitten and J.D. Tygar, “Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0,” Proc. USENIX Security Symposium, August 1999. http://www.usenix.org/publications/library/proceedings/sec99/full_papers/whitten/whitten.pdf Ross Anderson, “Why Cryptosystems Fail,” Communications of the ACM 37(11), November 1994. http://www.cl.cam.ac.uk/ftp/users/rja14/wcf.pdf October 12: Cyber Security In-The-Large Using information technology to attack – or to amplify attacks on – various elements of the nation’s critical infrastructure Ed Lazowska, UW: Assessing Cyber-Vulnerabilities: PITAC and Beyond Phil Venables, CISO, Goldman Sachs: The Resilient Enterprise: Convergence of Security, Compliance, Redundancy and Risky Kirk Bailey, ex-CISO, City of Seattle: Cyber-attacks and cyber-defense in the City of Seattle Ernie Hayden, CISO, Port of Seattle: Cyber-attacks and cyber-defense at the Port of Seattle Readings: Information Technology for Counterterrorism. Computer Science & Telecommunications Board, National Research Council, 2003. http://www7.nationalacademies.org/cstb/pub_counterterrorism.html. Read the Executive Summary, Chapter 1, Chapter 2, and Chapter 4.Cyber Security: A Crisis of Prioritization. President’s Information Technology Advisory Committee, 2005. http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf (pdf). Washington Post articles on cyber terrorism, August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/WA.Post.terrorism/ New York Times article, “The Rise of the Digital Thugs,” August 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/nyt.html Time article, “The Invasion of the Chinese Cyberspies,” September 2005. http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm CIO Magazine article, “The Sky Really Is Falling,” October 2005. http://www.cio.com/archive/100105/qa_lazowska.html October 19: Nuclear, Radiological & Chemical Weapons Richard A. Muller, UC Berkeley and LBNL: The Physics of WMD J. Patrick Fitch, LLNL: Biological Weapons and Detection Technologies Readings: R. Muller, "Chain Reactions, Nuclear Reactors, and Atomic Bombs,"


View Full Document

UW CSEP 590 - Syllabus

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Syllabus
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Syllabus and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Syllabus 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?