S’15 Textbooks
- Charlie Kaufman, Radia Perlman, and Mike Speciner, Network
Security: Private Communication in a Public World, Second Edition, ISBN 0130460192, Prentice Hall, 2002.
- Bruce Schneier, Beyond Fear: Thinking Sensibly About Security in an Uncertain World, ISBN 978-1475781199, Copernicus, 2003.
W’15-‘16 Textbooks
No text for this offering. Prof Vieau will be teaching it and will provide articles and other references as needed.
Additional readings
2020+
2016
2015
- Shellshock
- Alonso-Zaldivar, Ricardo. Lack of encryption standards raises health data privacy questions, PBS NewsHour, 2015-02-08.
- Barrett, Rick. Cyber attacks target small to midsize firms, security experts say, Milwaukee Journal Sentinel, 2015-03-11. [discussed W1D1]
- Buterin, Vitalik. Multisig: The Future of Bitcoin, Bitcoin Magazine, 2014-03-12.
- Cranor, Lorrie Faith. What’s wrong with your pa$$w0rd?, TED.com video, 2014-03.
- Dou, Eva. U.S. Coding Website GitHub Hit With Cyberattack, The Wall Street Journal, 2015-03-29.
- Elazari, Keren. Hackers: the Internet’s immune system, TED.com video, 2014-03.
- Farivar, Cyrus. First Chicago robber caught via facial recognition gets 22 years. ars technica, 2014-06-09. [discussed W5D2]
- Ghena, Braden, et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure, Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT ‘14), 2014-08. [would be great for a project presentation]
- Langley, Adam. Maintaining digital certificate security, Google Online Security Blog, 2015-03-23.
- Mazurczyk, W. and L. Caviglione. Information Hiding as a Challenge for Malware Detection, IEEE Security and Privacy, v. 13, i. 2, 2015-04-14.
- Mill, Eric. Why Google is Hurrying the Web to Kill SHA-1, konklone.com, 2014-09-07.
- Scahill, Jeremy and Josh Begley. iSpy: The CIA campaign to steal Apple’s secrets, The Intercept, 2015-03-10.
- Schneier, Bruce. Back Doors Won’t Solve Comey’s Going Dark Problem. Schneier on Security, 2015-07-31.
- Schneier, Bruce. Disclosing vs Hoarding Vulnerabilities. Schneier on Security, 2014-05-22.
- Schneier, Bruce. The Return of Crypto Export Controls?. Schneier on Security, 2014-11-14.
- Schneier, Bruce. The Democratization of Cyberattack . Schneier on Security, 2015-03-02.
- Schneier, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World W. W. Norton & Company, 2015-03-02.
- Schneier, Bruce. How the CIA Might Target Apple’s XCode. Schneier on Security, 2015-03-16.
- Schneier, Bruce. Easily Cracking a Master Combination Lock. Schneier on Security, 2015-05-05. [discussed in class 2015-05-06]
- Schneier, Bruce. Amateurs Produce Amateur Cryptography. Schneier on Security, 2015-05-12. [discussed in Class W10D1]
- Schneier, Bruce. Organizational Doxing. Schneier on Security, 2015-07-10.
- Stahl, Lesley. DARPA: Nobody’s safe on the Internet, CBS News, 2015-02-08.
- Tucker, Eric. US at odds with Google on computer search-warrant proposal, Associated Press, 2015-03-13.</a>
- Zengerle, Patricia. ‘Threat-sharing’ cybersecurity bill introduced in U.S. House, Reuters, 2015-03-24. [discussed W3D1]
- Zetter, Kim. Stealing data from computers using heat, Wired, 2015-03-23.
- ___. Avoiding the top 10 security flaws, IEEE Cybersecurity Initiative, 2014.
- ___. Computerised espionage: The spy who hacked me, The Economist, 2014-11-29.
- ___. Crashing the system: How to protect critical infrastructure from cyber-attacks, The Economist, 2014-07-12.
- ___. Cyber-crime and business: Think of a number and double it. The Economist, 2015-01-17.
- ___. Federal workers weaken cyberdefense. Milwaukee Journal-Sentinel, 2014-11-09.
- ___. Modifying devices: Wanted: a tinkerer’s charter. The Economist, 2014-12-06.
- ___. Prying Eyes: Inside the NSA’s War on Internet Security. Der Spiegel, 2014-12-28.
- ___. Ransomware: Your money or your data. The Economist, 2015-01-17.
- ___. Spooks v tech firms: Crypto wars 2.0. The Economist, 2014-11-08.
- ___. Telecoms and society: The truly personal computer, The Economist, 2015-02-28.
- ___. Video: NOVA Episode 4115: Rise of the Hackers. PBS, 2014-09-24.
Reading discussion
- On most days 1 or 2 students will present the day’s assigned reading (see the schedule for details) from the course’s second textbook.
- You should not use slides. If you feel slides would improve your presentation, please discuss that with me several days in advance.
- This presentation should last roughly 4 minutes times the number of presenters.
- Generally, each student will present separate parts of the assigned reading, but students assigned on the same day have the option of giving an integrated discussion.
- If you are absent on a day that you are assigned, you will be given an alternate discussion assignment later in the quarter and your reading grade will be reduced by 15%. I am glad to reschedule students without penalty who give me sufficient notice of excused absences (e.g., job interview). Please give the maximum possible notice to minimize the impact on other students in the class.
- The instructor will attempt to allow additional time for questions and discussion.
- This time does not allow for a comprehensive review; instead, highlight the key items you learned, connections to course material, and/or address one of the following questions:
- Does the chapter suggest anything about the author’s views or biases? Where there is controversy, were alternative views given fair treatment?
- Did certain parts of the chapter make you uncomfortable? If so, why? Did this lead you to question and revise or solidify your own views?
- What do you find surprising about the facts introduced in this chapter?
- Was there anything about the organization or presentation that helped your understanding? Could you adapt this to writing or presentations of your own?
- Does the author present in a way that is insightful, and if so, how does he achieve this?
- Does the chapter offer anything that you can directly apply outside of this class?
Grading
Reading Discussion | 15% |
Midterm Exam | 25% |
Presentation | 30% |
Final Exam | 30% |