Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare « Series from 2013

Series from 2013

Broadcast info
Genres: Special Interest

Virtually every aspect of global civilization now depends on interconnected cyber systems to operate...

which makes keeping these systems safe from threat one of the most pressing problems we face. Get an intriguing look at the structure of the Internet, the unique dangers it breeds, and the ways we're learning how to understand, manage, and reduce these dangers.

Share on
Share on Facebook
Facebook
X
Share on E-mail
E-mail

Stuxnet-The First Cyber Guided Missile

Your introduction to the fascinating - and fascinatingly dangerous - world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.

The Incredible Scope of Cyberspace

What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that make up a conceptual "map" of cyberspace, and more.

The Five Gateways of Internet Vulnerability

Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.

Of Viruses, Botnets, and Logic Bombs

Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats.

The Problem of Identity on the Network

Identification is perhaps the single most profound challenge for cybersecurity today. Delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems involved in this issue?

Cyber Fraud, Theft, and Organized Crime

Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are fighting back against organized, international cyber criminals.

Hacktivists and Insurgency

Nations at Cyber War

Government Regulation of Cyberspace

International Governance and the Internet

The Constitution and Cyberspace

Big Data-They- Know Everything about You

Privacy for the Cyber Age

Listening In and Going Dark

The Devil in the Chips-Hardware Failures

Protecting Yourself in Cyberspace

Critical Infrastructure and Resiliency

Looking Forward-What Does the Future Hold?