Cybersecurity for Critical Urban Infrastructure
About this Course
Critical urban infrastructure including energy, transportation, waste management, emergency service and communication systems are being hacked remotely by cyber attackers. These hackers use ransomware to encrypt the data cities need to run; then, they demand that public agencies pay a ransom to get their own data back. The costs associated with cyber attacks are substantial, extending to tens of millions of dollars to recreate data that are lost, and undermine the reputation of city governments across America. This course will prepare anyone who wants to work with agencies that are worried about their vulnerability to cyberattack. Topics include: • Who are the attackers and what are their methods? • What are the “defensive social engineering” moves cities can use to protect themselves? • What are the minimum security standards that all public agencies need to meet? • Who should have responsibility for overseeing cybersecurity in a public agency? • Should cities be willing to pay the ransoms demanded by hackers? • What should a city do after it has been attacked? • What are the most important lessons drawn by cities that have already been attacked? Through a series of explanatory videos (prepared by industry experts), case studies of an actual attack, role play simulations and debriefings, and short assigned readings, you will learn what cities can and should do to reduce their vulnerabilities. The course also includes checklists of various kinds that cybersecurity vulnerability assessors need to ask and answer.Created by: Massachusetts Institute of Technology
Level: Advanced

Related Online Courses
This course will introduce the core data structures of the Python programming language. We will move past the basics of procedural programming and explore how we can use the Python built-in data... more
With the advent of systems like AWS Lambda, the term serverless gained much popularity. However, many people are still unsure what it is for, and how it can help them build applications faster than... more
Quantum computing is coming closer to reality, with 80+ bit machines in active use. This course provides an intuitive introduction to the impacts, underlying phenomenon, and programming principles... more
This course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. The series of courses is... more
In this Capstone, you will demonstrate your ability to perform in an Information Technology (IT) Support role by applying your new knowledge to real-world situations. You will practice analyzing... more