We have root Even more advice from Schneier on security
Book - 2019
"We Have Root is the latest collection of essays by security and privacy expert Bruce Schneier. He explores a wide range of cybersecurity, privacy, and real-world security issues that are as current as today's headlines. Written in clear and understandable terms, his essays explore the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Rather than addressing technology experts. Schneier directs his writings to leaders, voters, and consumers. He challenges non-technical readers to question the status quo to make better security decisions and investments. As the internet and other technologies have become commonplace and fundamental to society, it is necessary to... understand how these work and how they affect our everyday world. Today, social media is essential to public discourse. The web is vital for commerce. Even more critically, the Internet now affects the world in a direct and physical manner. In the near future, the Internet will enable pervasive surveillance at unprecedented levels. The book's essays originally appeared in numerous publications, including the Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and others."--
- Subjects
- Published
-
Indianapolis, IN :
Wiley
[2019]
- Language
- English
- Main Author
- Physical Description
- xiii, 289 pages ; 23 cm
- Bibliography
- Includes online references, (especially pages [281]-289).
- ISBN
- 9781119643012
- Introduction
- 1. Crime, Terrorism, Spying, and War
- Cyberconflicts and National Security
- Counterterrorism Mission Creep
- Syrian Electronic Army Cyberattacks
- The Limitations of Intelligence
- Computer Network Exploitation vs. Computer Network Attack
- iPhone Encryption and the Return of the Crypto Wars
- Attack Attribution and Cyber Conflict
- Metal Detectors at Sports Stadiums
- The Future of Ransomware
- 2. Travel and Security
- Hacking Airplanes
- Reassessing Airport Security
- 3. Internet of Things
- Hacking Consumer Devices
- Security Risks of Embedded Systems
- Samsung Television Spies on Viewers
- Volkswagen and Cheating Software
- DMCA and the Internet of Things
- Real-World Security and the Internet of Things
- Lessons from the Dyn DDoS Attack
- Regulation of the Internet of Things
- Security and the Internet of Things
- Botnets
- IoT Cybersecurity: What's Plan B?
- 4. Security and Technology
- The NSA's Cryptographic Capabilities
- iPhone Fingerprint Authentication
- The Future of Incident Response
- Drone Self-Defense and the Law
- Replacing Judgment with Algorithms
- Class Breaks
- 5. Elections and Voting
- Candidates Won't Hesitate to Use Manipulative Advertising to Score Votes
- The Security of Our Election Systems
- Election Security
- Hacking and the 2016 Presidential Election
- 6. Privacy and Surveillance
- Restoring Trust in Government and the Internet
- The NSAIs Commandeering the Internet
- Conspiracy Theories and the NSA
- How to Remain Secure against the NSA
- Air Gaps
- Why the NSA's Defense of Mass Data Collection Makes No Sense
- Defending Against Crypto Backdoors
- A Fraying of the Public/Private Surveillance Partnership
- Surveillance as a Business Model
- Finding People's Locations Based on Their Activities in Cyberspace
- Surveillance by Algorithm
- Metadata = Surveillance
- Everyone Wants You to Have Security, But Not from Them
- Why We Encrypt
- Automatic Face Recognition and Surveillance
- The Internet of Things that Talk about You behind Your Back
- Security vs. Surveillance
- The Value of Encryption
- Congress Removes FCC Privacy Protections on Your Internet Usage
- Infrastructure Vulnerabilities Make Surveillance Easy
- 7. Business and Economics of Security
- More on Feudal Security
- The Public/Private Surveillance Partnership
- Should Companies Do Most of Their Computing in the Cloud?
- Security Economics of the Internet of Things
- 8. Human Aspects of Security
- Human-Machine Trust Failures
- Government Secrecy and the Generation Gap
- Choosing Secure Passwords
- The Human Side of Heartbleed
- The Security of Data Deletion
- Living in a Code Yellow World
- Security Design: Stop Trying to Fix the User
- Security Orchestration and Incident Response
- 9. Leaking, Hacking, Doxing, and Whistleblowing
- Government Secrets and the Need for Whistieblowers
- Protecting Against Leakers
- Why the Government Should Help Leakers
- Lessons from the Sony Hack
- Reacting to the Sony Hack
- Attack Attribution in Cyberspace
- Organizational Doxing
- The Security Risks of Third-Party Data
- The Rise of Political Doxing
- Data Is a Toxic Asset
- Credential Stealing as an Attack Vector
- Someone Is Learning How to Take Down the Internet
- Who Is Publishing NSA and CIA Secrets, and Why?
- Who Are the Shadow Brokers?
- On the Equifax Data Breach
- 10. Security, Policy, Liberty, and Law
- Our Newfound Fear of Risk
- Take Back the Internet
- The Battle for Power on the Internet
- How the NSA Threatens National Security
- Who Should Store NSA Surveillance Data?
- Ephemeral Apps
- Disclosing vs. Hoarding Vulnerabilities
- The Limits of Police Subterfuge
- When Thinking Machines Break the Law
- The Democratization of Cyberattack
- Using Law against Technology
- Decrypting an iPhone for the FBI
- Lawful Hacking and Continuing Vulnerabilities
- The NSA Is Hoarding Vulnerabilities
- WannaCry and Vulnerabilities
- NSA Document Outlining Russian Attempts to Hack Voter Rolls
- Warrant Protections against Police Searches of Our Data
- References