Due: Friday, January 25, 5pm. Extra Credit if submitted by January 18 at 5pm. Late submissions will be docked 20% per day late (days rounded up).
How to Submit: Details below, but in short note that you should submit in two ways -- to the Catalyst Dropbox and as a post to the security mindset forum.
We will repeat this assignment again later in the quarter, after you have had even more exposure to security. You can also receive extra credit if you submit a third security review or current event or both.
We will use a forum in our exploration of the broader contextual issues surrounding computer security. (In past years we used blogs and forums.) Please familiarize yourself with this post from 2007; it explains some of the reasons why we originally used a blog for CSE 484 / CSE M 584. In short, the blog was designed to be a vehicle for proactively developing "The Security Mindset." Class participants posted blog entries analyzing the security of existing products and reflecting on current events, and used the blog's comment feature to engage in conversations with others. However, one of the big downsides with the blog is that it really wasn't as interactive as one might want. That's why we switched to a forum last year and will continue to use a forum this year.
They say that one of the best ways to learn a foreign language is to immerse yourself in it. If you want to learn French, move to France. This assignment and the use of the forum is designed to immerse you in the security culture and to force you to think about security during non-course related activities, such as when you're reading news articles, talking with friends about current events, or when you're reading the description of a new product on Slashdot. Thinking about security will no longer be a chore relegated to the time you spend in lecture, on assigned readings, on textbook assignments, or on labs. You may even start thinking about security while you're out walking your dog, eating breakfast, at the gym, or at a movie. In short, you will be developing "The Security Mindset" and will start thinking like a seasoned security professional.
It is also extremely important for a computer security practitioner (and actually all computer scientists) to be aware of the broader contextual issues surrounding technology. Technologies don't exist in isolation, rather they are but one small aspect of a larger ecosystem consisting of people, ethics, cultural differences, politics, law, and so on. This assignment and the use of the forum will give you an opportunity to discuss and explore these "bigger picture" issues as they relate to security. As an added bonus, the forum will also give you an opportunity to exercise your writing and critical thinking skills in a cooperative learning environment with your peers.
You are encouraged to participate in discussions about these current events and security reviews on the forum, and you will receive credit for doing so as part of your course participation grade. All your posts and comments should be high-quality, thoughtful, and well-formulated.
Your article should: (1) summarize the current event; (2) discuss why the current event arose; (3) reflect on what could have been done different prior to the event arising (to perhaps prevent, deter, or change the consequences of the event ); (4) describe the broader issues surrounding the current event (e.g., ethical issues, societal issues); (5) propose possible reactions to the current event (e.g., how the public, policy makers, corporations, the media, or others should respond).
Please do your best to ensure that your current event is not the same as a previous current event article discussed in the forum. (Some overlap is inevitable, but please try to make sure each post has some unique content and perspective.)
There are some examples of past current event articles here. (You might have to scroll down a bit.)
It's OK if two articles review the same technology, say the Miracle Foo. But if you're the second reviewer of the Miracle Foo, you need to: (1) explicitly reference the earlier articles; (2) provide new technical contribution; (3) don't waste space repeating what the previous review said. (3) is important since you are all required read this forum, and it's not fair to ask your fellow students to spend time re-reading previously-posted material. For (2), new technical contributions might include: a new perspective on the risks; a new potential attack vector; or a new defensive mechanism.
Each security review should contain:
First, you should submit each to the forum. Note that you can pick a pseudonym for the forum, if you wish (but course staff will still be able to map from your real identities to your pseudonym). You don't need to include your name(s) in the forum post, though you are also welcome to if you wish.
Second, save a copy of your current event article or security review in PDF form (e.g., print to PDF on a Mac) and upload the PDF to the course Catalyst dropbox. If you work with someone else on your current events article or security review, then only one of you should upload the PDF to the course submission server. However, make sure that the names and UWNetIDs of all contributors are at the top of the first page of the PDF. This process will facilitate our ability to grade the current event articles and security reviews.