MIT CYBERSECURITY CLINIC
The new MIT Cybersecurity Clinic (11.274 and 11.074) will be offered in both the fall and spring semester at MIT.
The Cybersecurity Clinic will consist of four-modules : Cybersecurity for Critical Urban Infrastructure: Understanding the Problem; How the MIT Cybersecurity Clinic Makes Initial Contact with potential Client Agencies; Onsite Assessment of Cybersecurity Vulnerability by MIT Clinic Staff; and Prepare and Submit a Final Cybersecurity Vulnerability Assessment to a Client Agency. MIT students who want to take on field assignments with the Cybersecurity Clinic (for academic credit) must pass the certification examination offered at the end of the fourth module.
Students who have achieved certification, will work in teams supervised by advanced doctoral and post-doctoral students during the last nine weeks of the spring semester to collaborate with an assigned client agency to prepare a Cyberattack Vulnerability Assessment for a client agency.
WHO WE ARE
We are developing a new class of non-technical strategies against cyberattacks called Defensive Social Engineering. Cyber defenders can use Defensive Social Engineering along with technical tools to defeat or compromise attackers. One technique in the Defensive Social Engineering toolbox is Cyber Negotiation. This research is supported by MIT’s Internet Policy Research Initiative (IPRI).
RESOURCES
Click here for a list of publications and resources
ABOUT THIS BLOG
click above to read more about this blog and watch the short animation below
-
Boston Globe: How to Thwart Hackers (Local Cybersecurity)
-
Quick guide to the 6 ways we can regulate AI (MIT Tech Review)
-
World agencies issue cybersecurity guidance for smart cities
-
The Electronic Frontier Foundation Opinion Piece on the U.N. Cybercrime Treaty
-
Cyberattacks on local governments 2020: findings from a key informant survey
-
strategic approach to identify, stop and punish cyberattackers (Third Way Cyber Enforcement Initiative)
-
Cyberattack Causes Trains to Stop in Denmark
-
US to launch ‘labeling’ rating program for internet-connected devices in 2023
-
What Cities Should Know About the State and Local Cybersecurity Grant Program
-
Fight Against Disinformation – MIT Lincoln Laboratory
-
Boston Globe: How to Thwart Hackers (Local Cybersecurity)
Cities and towns don’t have the knowledge, staff, or money to fend off cyberattacks themselves. They need help – says the Boston Globe In late April, the City of Lowell’s computer system was hacked, disrupting…
-
Quick guide to the 6 ways we can regulate AI (MIT Tech Review)
Amidst advancements in generative AI tools, this MIT Technology Review article summarizes 6 potential avenues for countries to regulate AI, and their respective pros and cons. Entities that have proposed joint-regulations include the OECD, UN,…
-
World agencies issue cybersecurity guidance for smart cities
The Cybersecurity Best Practices for Smart Cities guide has been issued by the UK’s National Cyber Security Centre (NCSC), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Federal Bureau of Investigation…
-
The Electronic Frontier Foundation Opinion Piece on the U.N. Cybercrime Treaty
The Electronic Frontier Foundation Opinion Piece on the U.N. Cybercrime Treaty As the fifth session of the UN Cybercrime Convention commenced in Vienna at the beginning of April, the Electronic Frontier Foundation raised concerns with…
-
Cyberattacks on local governments 2020: findings from a key informant survey
This paper published in the Journal of Cyber Policy takes a close look at patterns of cyberattacks, types of attackers, the frequencies of incidents and breaches of local government IT systems, and purposes of attacks…
-
strategic approach to identify, stop and punish cyberattackers (Third Way Cyber Enforcement Initiative)
This paper by the Third Way Cyber Enforcement Initiative addresses the strategy and enforcement gap in cybersecurity in the U.S. Read more at: https://www.thirdway.org/report/to-catch-a-hacker-toward-a-comprehensive-strategy-to-identify-pursue-and-punish-malicious-cyber-actors
-
Cyberattack Causes Trains to Stop in Denmark
Cyberattack Causes Trains to Stop in Denmark https://www.securityweek.com/cyberattack-causes-trains-stop-denmark
-
US to launch ‘labeling’ rating program for internet-connected devices in 2023
US to launch ‘labeling’ rating program for internet-connected devices in 2023 The Biden administration said it will launch a cybersecurity labeling program for consumer Internet of Things devices starting in 2023 in an effort to…
-
What Cities Should Know About the State and Local Cybersecurity Grant Program
The U.S. Department of Homeland Security (DHS) and Federal Emergency Management Agency (FEMA) recently released the notice of funding opportunity for the State and Local Cybersecurity Grant Program (SLCGP). This program is funded through the…
-
Fight Against Disinformation – MIT Lincoln Laboratory
Mary Ellen Zurko pioneered user-centered security in the 1990s. Now she’s using those insights to help the nation thwart influence operations. Now a cybersecurity researcher at MIT Lincoln Laboratory, Zurko is still enmeshed in humans’…