Loading...
Banking on Bitcoin - How a Cyber-Currency is Disrupting the Economy
Bitcoin is the most disruptive invention since the internet, and now an ideological battle is underway between fringe utopists and mainstream capitalism. Bitcoin's early pioneers sought to blur the lines of sovereignty and the financial status quo. After years of…
Cyberwar Threat
Part of the Series: NOVA
PBS
The global cyberwar is heating up and the stakes are no longer limited to the virtual world of computers. Now, thanks in part to secret documents released by Edward Snowden, the true scale of the National Security Agency's scope and…
Privacy for the Cyber Age
Episode 13 of Thinking about Cybersecurity
It appears our current conceptions of privacy in cyberspace will disappear. So what can we do about it? By exploring how the government and private sector use "Big Data"--and how "Big Data" can keep the government honest--you'll discover insights into…
Stuxnet—The First Cyber Guided Missile
Episode 1 of Thinking about Cybersecurity
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which…
Big Data—“They” Know Everything about You
Episode 12 of Thinking about Cybersecurity
In the first of two episodes on personal data tracking and privacy, ponder the problem of "Big Data"--where your Internet searches can be tracked, your cellphone can broadcast your geographical location instantly, and your online purchases can be catalogued. It's…
Of Viruses, Botnets, and Logic Bombs
Episode 4 of Thinking about Cybersecurity
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then,…
Bet Raise Fold - The Story of Online Poker
This documentary follows a new generation of internet poker professionals during the meteoric rise and sudden crash of the multibillion dollar online poker industry of the 2000s. For millions of young people, online poker was more than a game, it…
The Devil in the Chips—Hardware Failures
Episode 15 of Thinking about Cybersecurity
Hardware-based threats are one of the most vexing problems in the entire cybersecurity domain. How do we know that our machines will actually do what we tell them to do? Why is compromised hardware such a critical threat to cybersecurity?…
Hacktivists and Insurgency
Episode 7 of Thinking about Cybersecurity
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate…
Protecting Yourself in Cyberspace
Episode 16 of Thinking about Cybersecurity
Get practical tips on how to reduce your own risk of danger online in your professional and personal life. You'll find out how to choose the most effective passwords, how to set up the most effective personal computer security systems,…
The Constitution and Cyberspace
Episode 11 of Thinking about Cybersecurity
Return to American policies on cybersecurity, this time focusing on the idea of government monitoring of the Internet. Start by learning all about how on-network monitoring systems work. After that, step back and examine how government monitoring is enforced and…
The Incredible Scope of Cyberspace
Episode 2 of Thinking about Cybersecurity
What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a…
Listening In and Going Dark
Episode 14 of Thinking about Cybersecurity
Learn how encryption and wiretapping work in cyberspace, and how both methods are becoming increasingly frustrating for law enforcement and national security officials. This "going dark" phenomenon, as you'll find in this eye-opening discussion, brings benefits and causes problems--and the…
Government Regulation of Cyberspace
Episode 9 of Thinking about Cybersecurity
Join the debate about government regulation of cyberspace with this episode that considers both sides of the issue. By looking at the debate in America over government oversight of cybersecurity (and whether we even need it at all), you'll be…
Nations at Cyber War
Episode 8 of Thinking about Cybersecurity
Turn now to the highest level of cyber conflict: a cyber war between nation-states. What is meant by the term "cyber war"? How does one fight a battle in cyberspace? What do the enemies look like? Do traditional international rules…
International Governance and the Internet
Episode 10 of Thinking about Cybersecurity
Continue exploring rules and regulations about the Internet, this time on the international level. First, Professor Rosenzweig discusses existing Internet governance and the dynamics leading to change. Then, he assesses some of the barriers to effective international governance of the…
Critical Infrastructure and Resiliency
Episode 17 of Thinking about Cybersecurity
Take an alternate approach to cybersecurity, this time focusing on resiliency and recovery. There may be good reason to think that creating a system that isn't immune to failure but is less likely to be attacked--and better able to operate…
Looking Forward—What Does the Future Hold?
Episode 18 of Thinking about Cybersecurity
Finish the course with a helpful summary of the main issues and arguments involved in the current state of cybersecurity throughout the world. Then, take an intriguing peek into the future to explore possible--and even radical--new developments that may shape…
Cyber Fraud, Theft, and Organized Crime
Episode 6 of Thinking about Cybersecurity
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the…
The Five Gateways of Internet Vulnerability
Episode 3 of Thinking about Cybersecurity
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't…