Privacy for the Cyber Age

Privacy for the Cyber Age
Show More

Related videos

Big Data—“They” Know Everything about You
In the first of two episodes on personal data tracking and privacy, ponder the problem of "Big Data"--where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It's a frightening aspect of cybersecurity, and one that, unfortunately, is…
Stuxnet—The First Cyber Guided Missile
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.
Cyber Fraud, Theft, and Organized Crime
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are…
Nations at Cyber War
Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term "cyber war"? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules of armed conflict apply? How do we counter such an…
A Good American - Behind a Government Surveillance Program
A gripping docu-thriller about a groundbreaking surveillance program, the brilliant mastermind behind it and how a perfect alternative to mass surveillance was killed by NSA-management for money - three weeks prior to 9/11. Bill Binney was a brilliant cryptologist, long-time National Security Agency analyst, and Technical Director. He developed a…
Thinking about Cybersecurity - From Cyber Crime to Cyber Warfare Series
Virtually every aspect of global civilization now depends on interconnected cyber systems to operate... which makes keeping these systems safe from threat one of the most pressing problems we face. Get an intriguing look at the structure of the Internet, the unique dangers it breeds, and the ways we're learning…
The Incredible Scope of Cyberspace
What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that…
The Five Gateways of Internet Vulnerability
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.
Of Viruses, Botnets, and Logic Bombs
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture…
The Problem of Identity on the Network
Identification is perhaps the single most profound challenge for cybersecurity today. In this episode, delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems…
Hacktivists and Insurgency
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents,…
Government Regulation of Cyberspace
Join the debate about government regulation of cyberspace with this episode that considers both sides of the issue. By looking at the debate in America over government oversight of cybersecurity (and whether we even need it at all), you'll be better informed about a topic that has serious ramifications for…