cybersecurity8881.7 — Practical QuestionsTopic 1: Defining Cyber, Security, and Cybersecurity PolicyFeb 9Feb 9
cybersecurity888Lecture 2 — Securing Systems — Questions— — — — — — — — — — — — — — — — — — — — — — — —Feb 9Feb 9
cybersecurity888Lecture 3 — Securing Software — transcriptIntroduction to Cybersecurity Focus:Feb 9Feb 9
cybersecurity888Lecture 2 — Assignment 3 — Securing SoftwareVia what technique(s) might a malicious actor “crack” software (that is, bypass registration/payment to use it)?Feb 8Feb 8
cybersecurity888James R. Clapper, Worldwide Threat Assessment of the US Intelligence CommunityJames R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) — pp. 1–4Feb 8Feb 8
cybersecurity8881.6 — Examples Of Cyber IncidentsTopic 1: Defining Cyber, Security, and Cybersecurity PolicyFeb 8Feb 8