Welcome to the spring edition of CIT Security Topics. For those of you wondering the topics for the course this semester will be as follows:
- How to survive and other myths of graduate school
- Spying, dataveilance, other tomfoolery you don’t know about
- Sabotage, bad things happen to good people and other happy thoughts
- Fear, uncertainty, doubt and other ways to sway people
- Terror in the skies, network, and other things that go bump in the night
- Robots in disguise, tactics and responses, transformation of critical infrastructures
- Boy that is big, the grid, the cyber stuff of legend
- War and conflict, or when the in-laws stay to long
- Law and other things that are mutually incompatible with society
- Who you drink with may not be your friend, neighbors who are risky
For the first weeks class you can log into WebCT but the items you’re going to have to be familiar with are as follows. You should read them all and be prepared to discuss in detail.
- Build and operate a trusted GIG an information assurance policy chart
- Software Assurance a strategic initiative of the U.S. Department of Homeland Security to promote integrity, security, and reliability in software
- Professor Kabay’s list of frequently corrected errors
- Professor Kabay on writing in a graduate program
- KPMG The impact of digitalization – A generation apart
- Cyber In-Security: Strengthening the federal cyber security workforce
- Who protects the Internet – by James Gearey
- Privacy and security answering the wrong questions is no answer – Eugene Spafford (login Required)
- Protection and the control of information sharing in Multics – Jerome H. Saltzer (login Required)
What are the relationships between the assigned papers each week? Look at the papers from a chronological view point. Look at the papers from a subject view point. Assess each paper or document as a hostile reviewer. Your job is to be extremely critical of the literature and determine the value (if any) of the documents. However, you must back it up with reasoning.