Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-What is Cyber? (Week 1, Introduction & Lecture 1)
Foundations: An Introduction
()
Optional Reading: Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy”
What is Cyber?
()
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-What is Security? (Week 1, Lecture 2)
What is Security?
()
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-Demystifying the Cybersecurity Problem (Week 1, Lecture 3)
Demystifying the Cybersecurity Problem
()
National Research Council, “At the Nexus of Cybersecurity and Public Policy”, Ch. 1
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-The Threat Landscape (Week 1, Lecture 4)
The Threat Landscape
()
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-Threat Landscape Challenge (Week 1, Lecture 5)
Threat Landscape Challenge
()
Avast, 2020 Threat Landscape Report
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-Examples of Cyber Incidence (Week 1, Lecture 6)
Examples of Cyber Incidence
()
James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) – pp. 1-4
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)-Practical Questions (Week 1, Lecture 7)
Practical Questions
()
Cybersecurity for Everyone: Evolution of the Internet (Week 2)-Academic Inspiration and a World Changing Idea (Week 2, Lecture 1)
Academic Inspiration and a World Changing Idea
()
Leiner, Cerf, et. al., A Brief History of the Internet – pp. 1-9
Cybersecurity for Everyone: Evolution of the Internet (Week 2)-Government Support and Prototyping (Week 2, Lecture 2)
Government Support and Prototyping
()
Cybersecurity for Everyone: Evolution of the Internet (Week 2)-Private Sector Support and Moving the Internet Out of the Lab (Week 2, Lecture 3)
Private Sector Support and Moving the Internet Out of the Lab
()
Cybersecurity for Everyone: Evolution of the Internet (Week 2)-Privatizing and Scaling the Internet (Week 2, Lecture 4)
Privatizing and Scaling the Internet
()
Cybersecurity for Everyone: Evolution of the Internet (Week 2)-Building the World Wide Web (Week 2, Lecture 5)
Building the World Wide Web
()
Cybersecurity for Everyone: Evolution of the Internet (Week 2)-The Internet as a Global Commons (Week 2, Lecture 6)
The Internet as a Global Commons
()
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)-How Data Moves: Encapsulation (Week 3, Lecture 1)
How Data Moves: Encapsulation
()
Vangie Beal “The 7 layers of the OSI Model”, Webopedia
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)-How Data Moves: Application Layer (Week 3, Lecture 2)
How Data Moves: Application Layer
()
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)-How Data Moves: Network Layer (Week 3, Lecture 3)
How Data Moves: Network Layer
()
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)-How Data Moves: Physical Layer (Week 3, Lecture 4)
How Data Moves: Physical Layer
()
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)-What is Governance? (Week 3, Lecture 5)
What is Governance?
()
Joseph S. Nye, Jr. “The Regime Complex for Managing Global Cyber Activities”, Global Commission on Internet Governance“ 2014
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)-Governing the Internet (Week 3, Lecture 6)
Governing the Internet
()
Assante & Bochman “IoT, Automation, Autonomy, and Megacities in 2025: A Dark Preview”, Center for Strategic & International Studies, April 2017
Fischer, “The Internet of Things: Frequently Asked Questions” Congressional Research Service, Oct 2015
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)-Threat Actors: Who Are the Hackers? (Week 4, Lecture 1)
Threat Actors: Who Are the Hackers?
()
Cybersecurity Threats Impacting the Nation
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)-Threat Actors: Hobbyists (Week 4, Lecture 2)
Threat Actors: Hobbyists
()
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)-Threat Actors: Criminal Organizations (Week 4, lecture 3)
Threat Actors: Criminal Organizations
()
Fire Eye, “APT28 Cybergroup Activity”
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)-Cyber Crime Case Study: The San Francisco Muni Attack (Week 4, Lecture 4)
Cyber Crime Case Study: The San Francisco Muni Attack
()
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)-Threat Actors: Hacktivists (Week 4, Lecture 5)
Threat Actors: Hacktivists
()
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)-Threat Actors: Advanced Persistent Threats (Week 4, Lecture 6)
Threat Actors: Advanced Persistent Threats
()
Lillian Ablon, Martin C. Libicki, Andrea A. Golay, Markets for cybercrime tools and stolen data, RAND Corporation
Cybersecurity for Everyone: The Hacking Process (Week 5)-Hacking As a Process (Week 5, Lecture 1)
Hacking As a Process
()
Lockheed Martin Cyber Kill chain
Cybersecurity for Everyone: The Hacking Process (Week 5)-Reconnaissance (Week 5, Lecture 2)
Reconnaissance
()
Cybersecurity for Everyone: The Hacking Process (Week 5)-Weaponization (Week 5, Lecture 3)
Weaponization
()
MITRE ATT&CK Framework
Cybersecurity for Everyone: The Hacking Process (Week 5)-Delivery (Week 5, Lecture 4)
Delivery
()
Cybersecurity for Everyone: The Hacking Process (Week 5)-Exploitation and Installation (Week 5, Lecture 5)
Exploitation and Installation
()
Cybersecurity for Everyone: The Hacking Process (Week 5)-Command and Control (Week 5, Lecture 6)
Command and Control
()
Boebert, W. Earl, “A Survey of Challenges in Attribution,” in National Research Council, Proceedings of a Workshop on Deterring Cyberattacks, 2010, pp. 41-52.
Cybersecurity for Everyone: The Hacking Process (Week 5)-Effects (Week 5, Lecture 7)
Effects
()
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)-Framing Effects (Week 6, Lecture 1)
Framing Effects
()
Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy” , CISSM
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)-Primary Effects (Week 6, Lecture 2)
Primary Effects
()
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)-Secondary Effects (Week 6, Lecture 3)
Secondary Effects
()
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)-Second Level Effects (Week 6, Lecture 4)
Second Level Effects
()
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)-A Strategic Approach to Cybersecurity (Week 6, Lecture 5)
A Strategic Approach to Cybersecurity
()