This is a preview of how your content will look on export. To export the complete content in DOC format, click the blue export button in the upper right corner of this page.
1.1 Introduction to Computers and Computer Vulnerabilities
Purpose: Provide a framework through which to examine issues pertaining to securing the electronic environment, such as hardware, software, and the supply chain.
  • 1 1.1.1 Computer Architecture Overview

    • 1.1 William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; The Basic Technology of Cyberattack in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp82-91

      A very brief review of today’s IT infrastructure, as well as scale and timing considerations.

    • 1.2 John Savage, Computer Architecture, Lecture slides from CSCI 1800: Cybersecurity and International Relations, Feb 1, 2012

  • 2 1.1.2 Computer Sources of Vulnerability

    • 2.1 William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Committee on Offensive Information Warfare, National Research Council; Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions in Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, 2009, pp360-367

      This short overview covers vulnerabilities pertaining to hardware, software, seams between the two, communications channels, and configuration.

    • 2.2 John Savage, Operating Systems and Applications, Lecture slides form CSCI 1800: Cybersecurity and International Relations, Feb 8, 2012

You've reached the bottom of your content preview.
To view the rest in your browser, click here.
To export the complete content in DOC format, click the blue export button in the upper right corner of this page.

(Note: If you view the entire playlist, any changes you've made to export settings will be lost. Large playlists may temporarily freeze your browser while loading, as well.)