Cart 0 $0.00
IRE favicon

Shop

Resource ID: #812
Subject: 333
Source: Quinn Norton - 2198Quinn Norton
Affiliation: Independent journalistIndependent journalist
Date: 1905-07-08

$0.00

Description

This interactive workshop covered what's known as "threat modeling" in the computer security world. The goal was to help participants understand how networks view them as users, how they can shape what a network sees and how to realistically defend themselves against common attacks. They covered some security tools and techniques, but the class was focused on understanding the networked environment well enough that attendees could tailor these to their particular situation. First, they looked at the networks we use every day, how we relate to them and how they are used by others. Next, they went over some real-world attack examples that range from direct hacking, traffic analysis and implicit information to jurisdictional attacks, such as subpoenas. The last third of the workshop was an open discussion where participants could talk about their specific needs and potential next steps.

109 Lee Hills Hall, Missouri School of Journalism   |   221 S. Eighth St., Columbia, MO 65201   |   573-882-2042   |   info@ire.org   |   Privacy Policy
apartmentpenciluserscalendar-fullcrossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram
My cart
Your cart is empty.

Looks like you haven't made a choice yet.