8 Cybersecurity Day 1 8 Cybersecurity Day 1
8.1 Historical Perspective 8.1 Historical Perspective
8.1.1. Bruce Berkowitz and Robert Hahn, “Cybersecurity: Who’s Watching the Store?” Issues in Science and Technology (Spring 2003)
8.2 Security Theory 8.2 Security Theory
8.2.1. Jonathan Zittrain, "Chapter 3: Cybersecurity," The Future of the Internet and How to Stop It (2008)
8.2.2. Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011)
8.2.3. Peter Singer and Allan Friedman, “The Five Biggest Cybersecurity Myths, Debunked,” WIRED (Jul 2, 2014)
8.3 Security Examples 8.3 Security Examples
8.3.1. Jose Andrade, “What is Heartbleed, anyway?” Engadget (Apr. 12, 2014)
8.3.2. Dan Geer, “Heartbleed as Metaphor” LawFare (Apr. 21, 2014)
8.3.3. Bruce Schneier, “The Internet of Things is Wildly Insecure—And Often Unpatchable,” Schneier on Security (Jan 6. 2014)
8.4 [SKIM] State-based Attacks 8.4 [SKIM] State-based Attacks
[SKIM] State-based Attacks