Mehr lesen
This book explains why cyber security is in the state it is, with daily incidents hitting the headlines. It doesn't offer easy solutions, or attribute blame, but instead looks at the complex mix of technical and human systems which contribute to the challenge.
Inhaltsverzeichnis
- List of Figures
- 0. Mind Your Cybers: Introduction
- Interlude I. DigiNotar: A Cautionary Tale
- 1. Was It Encrypted?: Applied Cryptography
- 2. We're Only Human: Human Factors
- INTERLUDE II. Guessing Passwords
- 3. In the Round: Secure Systems
- 4. Know Your Enemy: Adversarial Behaviours
- 5. Choose Your Priorities: Risk Management
- INTERLUDE III. Identity
- 6. Permission Denied: Authentication, Authorization,and Accountability
- 7. Who's Watching You?: Privacy and Online Rights
- Interlude IV. Phil Zimmermann and Pretty Good Privacy
- 8. Shall I love Big Brother?: Law and Regulation
- 9. Getting Ahead of the Bear: Security Operations and Incident Management
- 10. It's All in Code: 'Software Security'
- Interlude V. Device and Service Identity
- 11. Connections are Crucial: Network Security
- 12. No More White Coats: Operating Systems Security
- 13. Software with Malice: Malware and Attack Technologies
- Interlude VI. Stuxnet: Cyber Weapons Come of Age
- 14. No One is in Charge of the Chains?: Distributed Systems and Distributed Ledgers
- 15. I Don't Want a Turing Machine: Hardware Security
- Interlude VII. Turing Machine: A Conceptual Computer
- 16. The Internet of Everything: Cyber-Physical Systems
- Afterword
- Acknowledgements
- Glossary
- Books for Further Reading
- Papers and Reports
- Resources
- Index
Zusammenfassung
This book explains why cyber security is in the state it is, with daily incidents hitting the headlines. It doesn't offer easy solutions, or attribute blame, but instead looks at the complex mix of technical and human systems which contribute to the challenge.