Book description
Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.
Table of contents
- Copyright
- Credits
- Introduction
-
1. Terrorism and Security
- 1.1. What the Terrorists Want
- 1.2. Movie-Plot Threats
- 1.3. Fixing Intelligence Failures
- 1.4. Data Mining for Terrorists
- 1.5. The Architecture of Security
- 1.6. The War on the Unexpected
- 1.7. Portrait of the Modern Terrorist as an Idiot
- 1.8. Correspondent Inference Theory and Terrorism
- 1.9. The Risks of Cyberterrorism
-
2. National Security Policy
- 2.1. The Security Threat of Unchecked Presidential Power
- 2.2. Surveillance and Oversight
- 2.3. NSA and Bush's Illegal Eavesdropping
- 2.4. Private Police Forces
- 2.5. Recognizing "Hinky" vs. Citizen Informants
- 2.6. Dual-Use Technologies and the Equities Issue
- 2.7. Identity-Theft Disclosure Laws
- 2.8. Academic Freedom and Security
- 2.9. Sensitive Security Information (SSI)
- 2.10. Fingerprinting Foreigners
- 2.11. U.S. Medical Privacy Law Gutted
- 3. Airline Travel
-
4. Privacy and Surveillance
- 4.1. Our Data, Ourselves
- 4.2. The Value of Privacy
- 4.3. The Future of Privacy
- 4.4. Privacy and Power
- 4.5. Security vs. Privacy
- 4.6. Is Big Brother a Big Deal?
- 4.7. How to Fight
- 4.8. Toward Universal Surveillance
- 4.9. Kafka and the Digital Person
- 4.10. CCTV Cameras
- 4.11. Anonymity and Accountability
- 4.12. Facebook and Data Control
- 4.13. The Death of Ephemeral Conversation
- 4.14. Automated Targeting System
- 4.15. Anonymity and the Netflix Dataset
- 4.16. Does Secrecy Help Protect Personal Information?
- 4.17. Risks of Data Reuse
- 5. ID Cards and Security
- 6. Election Security
- 7. Security and Disasters
-
8. Economics of Security
- 8.1. Economics and Information Security
- 8.2. Aligning Interest with Capability
- 8.3. National Security Consumers
- 8.4. Liability and Security
- 8.5. Liabilities and Software Vulnerabilities
- 8.6. Lock-In
- 8.7. Third Parties Controlling Information
- 8.8. Who Owns Your Computer?
- 8.9. A Security Market for Lemons
- 8.10. Websites, Passwords, and Consumers
- 9. Psychology of Security
- 10. Business of Security
- 11. Cybercrime and Cyberwar
-
12. Computer and Information Security
- 12.1. Safe Personal Computing
- 12.2. How to Secure Your Computer, Disks, and Portable Drives
- 12.3. Crossing Borders with Laptops and PDAs
- 12.4. Choosing Secure Passwords
- 12.5. Authentication and Expiration
- 12.6. The Failure of Two-Factor Authentication
- 12.7. More on Two-Factor Authentication
- 12.8. Home Users: A Public Health Problem?
- 12.9. Security Products: Suites vs. Best-of-Breed
- 12.10. Separating Data Ownership and Device Ownership
- 12.11. Assurance
- 12.12. Combating Spam
- 12.13. Sony's DRM Rootkit: The Real Story
- 12.14. The Storm Worm
- 12.15. The Ethics of Vulnerability Research
- 12.16. Is Penetration Testing Worth It?
- 12.17. Anonymity and the Tor Network
- 12.18. Kill Switches and Remote Control
- A. References
Product information
- Title: Schneier on Security
- Author(s):
- Release date: September 2008
- Publisher(s): Wiley
- ISBN: 9780470395356
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive …
book
Assessing and Managing Security Risk in IT Systems
This book begins with an overview of information systems security, offering the basic underpinnings of information …
book
Carry On: Sound Advice from Schneier on Security
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority …