Cart 0 $0.00
IRE favicon


Resource ID: #246
Subject: 333
Source: Quinn Norton - 21Quinn Norton
Affiliation: UsenetUsenet
Date: 1905-07-05



This is an interactive workshop in digital security focused on what's called "Threat Modeling" in the computer security world -- understanding how the networks you use see you, and how to realistically defend against the most likely attacks. We'll cover some security tools and techniques, but we're focused on understanding the networked environment well enough to let you seek out tools and techniques suited to your situation. The workshop is in three parts. We'll begin by looking at the networks we use every day, how we relate to them, and how they are used by others. In the second part, we'll go over some real world examples of attacks, ranging from direct hacking, traffic analysis and implicit information, all the way to jurisdictional attacks such as subpoenas. Finally, we'll play through red team/blue team scenarios based on real world situations, to give a sense of choices and their consequence in a journalist's personal digital security.

109 Lee Hills Hall, Missouri School of Journalism   |   221 S. Eighth St., Columbia, MO 65201   |   573-882-2042   |   |   Privacy Policy
apartmentpenciluserscalendar-fullcrossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram
My cart
Your cart is empty.

Looks like you haven't made a choice yet.