Week 1, Lecture 1 - Introduction
Date: 9/26/22
Questions: - Textbook? Readings? Last year recordings?
Intro
- Not too technical
- Cybersecurity from offensive pov.
- Aim to get working understanding of common attacks (mostly from policy side)
- Lectures + sections
- Monday: tech lecture (Alex), weekly assignment available
- Also one discussion section on one of Tuesday, Wednesday, Thursday, Friday
- Lab (work together)
- Wednesday: law lecture (Riana)
- Virtual machines reset weekly so no late work I guess
- Grading:
- 10%: discussion attendance
- … (see slides)
Hacking
- Snowden: exposed the capabilities of the US.
- Key to global competition for power in this day and age.
- What can hackers do?
- Proper taxonomy is tier-ed (not based on who they work for since those lines are fluid), but based on skill level and capabilities.
- {Paste chart}.
- Layers of abstraction hide things away
- i.e., a hacker hacking upstream for a government would have less chance of getting caught if their position is far away from the actor.
- Zero-day exploit
Types of state actors
Now a less fine-grained taxonomy… - Superpowers: large orgs, countries, etc. - Examples: five i’s: US, UK, AUS, NZ, CAN - Rapid risers: north korea (lazarus group), vietnam, south korea… - Rapid improving, learn quickly from superpowers - Peleton: lots of people doing this work but mostly private contractors, (e.g., India). - Ambitious …: poor, not many resources
Nation state control
What control does the government have over bad actors? - Full control: In USA: non-authorized hacking is prosecuted. - Less control: e.g., Korea - No control: no laws, e.g., Nigeria
Misc.
- Side-channel attacks:
- Not used much but lots of Phd students study this