MIT CYBERSECURITY CLINIC
The new MIT Cybersecurity Clinic (11.274 and 11.074) will be offered in both the fall and spring semester at MIT.
The Cybersecurity Clinic will consist of four-modules : Cybersecurity for Critical Urban Infrastructure: Understanding the Problem; How the MIT Cybersecurity Clinic Makes Initial Contact with potential Client Agencies; Onsite Assessment of Cybersecurity Vulnerability by MIT Clinic Staff; and Prepare and Submit a Final Cybersecurity Vulnerability Assessment to a Client Agency. MIT students who want to take on field assignments with the Cybersecurity Clinic (for academic credit) must pass the certification examination offered at the end of the fourth module.
Students who have achieved certification, will work in teams supervised by advanced doctoral and post-doctoral students during the last nine weeks of the spring semester to collaborate with an assigned client agency to prepare a Cyberattack Vulnerability Assessment for a client agency.
WHO WE ARE
We are developing a new class of non-technical strategies against cyberattacks called Defensive Social Engineering. Cyber defenders can use Defensive Social Engineering along with technical tools to defeat or compromise attackers. One technique in the Defensive Social Engineering toolbox is Cyber Negotiation. This research is supported by MIT’s Internet Policy Research Initiative (IPRI).
RESOURCES
Click here for a list of publications and resources
ABOUT THIS BLOG
click above to read more about this blog and watch the short animation below
-
USA Today: Cyberattacks on Critical Infrastructure Are Increasingly Common
-
CISA Proposed Cybersecurity Incident Reporting Requirements for Critical Infrastructure Companies Opened for Comment
-
Boston Globe: How to Thwart Hackers (Local Cybersecurity)
-
Quick guide to the 6 ways we can regulate AI (MIT Tech Review)
-
World agencies issue cybersecurity guidance for smart cities
-
The Electronic Frontier Foundation Opinion Piece on the U.N. Cybercrime Treaty
-
Cyberattacks on local governments 2020: findings from a key informant survey
-
strategic approach to identify, stop and punish cyberattackers (Third Way Cyber Enforcement Initiative)
-
Cyberattack Causes Trains to Stop in Denmark
-
US to launch ‘labeling’ rating program for internet-connected devices in 2023
-
Ex-employee tampered with Kansas water plant, feds say, a sign of online vulnerability
Wyatt Travnichek was the person responsible for monitoring the water quality in eight central countries in Kansas. In January 2019, he resigned for unknown reasons. Two years later, Travnichek is charged with “illegally tampering with…
-
Hackers demand up to $40 million in ransom from Broward schools
Ransomware attacks have been occurring more frequently over the past few years, and one sector that has been extremely impacted is education. Universities and places of higher education store personal data of tens of thousands…
-
New York regulator warns of ‘systemic and aggressive’ data theft campaign
On the heels of releasing a cyber risk insurance framework, the New York Department of Financial Services (NYDFS) issued an alert about a “systemic and aggressive” campaign to steal data from public-facing websites. Hackers appear…
-
Cyber insurance faces ‘turning point’ on industrial systems attacks
The risk of physical damage or injury due to cyberattacks on industrial control systems is becoming. “increasingly likely,” and poses a real threat to the cyber insurance world, according to a new study from Lloyd’s…
-
Are Cyber-insurers Responsible for Increased Cybercrime?
Auto insurers that pay back stolen car loans are never considered the ones responsible for increased levels of car theft. Similarly, home insurers do not bear the brunt of contributing to rises in burglary. The…
-
FYI: Cyber-Insurance Conference February 24th and 25th
Advisen’s Cyber Risk Insights Conference San Francisco @ Home Virtual Series, a conference on issues of Cyber Risk and Cyber Insurance, will be occuring virtually February 24th and February 25th. More information on the conference…
-
What Can Hospitals Do To Protect Themselves from Cyber Attack?
While everyone’s eyes we on the possibility of cyberattacks against government systems during the US presidential election, hospitals in America were, in fact, actually being attacked. The FBI reported on October 27th that more than…
-
Michigan State University Refuses to Pay Ransom
Samuel Zwickel writes for the Detroit Free Press about Michigan State University's refusal to give into a hacker threatening to publish students’ personal records and university financial documents if the university fails to pay an…
-
Industrial Control Systems
Industrial Control Systems (ICS) are used to manage the internal operations of facilities by allowing communication with physical devices. They are used in automated plants, factories, and many other types of facilities. Places using…
-
It’s time to cyber-protect Industrial Control Systems
Image by David Mark from Pixabay Again, another phishing email. This time the attackers went after a natural gas operator in the US. The attack was aimed at the Industrial Control System (ICS), affecting "crucial real-time…