Carry on: sound advice from Schneier on security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVIII, 356 S. |
ISBN: | 9781118790816 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041627210 | ||
003 | DE-604 | ||
005 | 20140515 | ||
007 | t | ||
008 | 140205s2014 |||| 00||| eng d | ||
020 | |a 9781118790816 |c Druckausg. |9 978-1-118-79081-6 | ||
020 | |z 9781118790822 |c ebk |9 978-1-118-79082-2 | ||
035 | |a (OCoLC)881854969 | ||
035 | |a (DE-599)GBV77305183X | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-473 |a DE-91G | ||
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
100 | 1 | |a Schneier, Bruce |d 1963- |e Verfasser |0 (DE-588)123003180 |4 aut | |
245 | 1 | 0 | |a Carry on |b sound advice from Schneier on security |c Bruce Schneier |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2014 | |
300 | |a XVIII, 356 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-79083-0 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027068191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027068191 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804151843656302592 |
---|---|
adam_text | Introduction
....................................xv
1
The Business and Economies
of Security
................1
Consolidation: Plague or Progress
............................1
Prediction: RSA Conference Will Shrink Like a Punctured Balloon
.... 2
How to Sell Security
......................................4
Why People Are Willing to Take Risks
......................4
How to Sell Security
...................................6
Why Do We Accept Signatures by Fax?
........................7
The Pros and Cons of LifeLock
..............................9
The Problem Is Information Insecurity
.......................12
Security
ROI:
Fact or Fiction?
..............................14
The Data Imperative
.................................15
Caveat Emptor
......................................16
Social Networking Risks
..................................17
Do You Know Where Your Data Are?
........................18
Be Careful When You Come to Put Your Trust in the Clouds
.......21
Is Perfect Access Control Possible?
..........................22
News Media Strategies for Survival for Journalists
...............24
Security and Function Creep
..............................26
Weighing the Risk of Hiring Hackers
.........................27
Should Enterprises Give In to IT Consumerization at the Expense of
Security?
..............................................29
The Vulnerabilities Market and the Future of Security
............30
So You Want to Be a Security Expert
.........................33
When It Comes to Security, We re Back to Feudalism
............34
I Pledge Allegiance to the United States of Convenience
......35
The Good, the Bad, and the Ugly
.......................36
You Have No Control Over Security on the Feudal Internet
.......37
viii Contents
2
Crime, Terrorism, Spying, and War
...................
4Ί
America s Dilemma: Close Security Holes, or
Exploit Them Ourselves
..................................41
Are Photographers Really a Threat?
.........................43
CCTV Doesn t Keep Us Safe, Yet the Cameras Are Everywhere
.....45
Chinese Cyberattacks: Myth or Menace?
.....................47
How a Classic Man-in-the-Middle Attack Saved
Colombian Hostages
....................................48
How to Create the Perfect Fake Identity
......................51
A Fetishistic Approach to Security Is a Perverse
Way to Keep Us Safe
.....................................52
The Seven Habits of Highly Ineffective Terrorists
...............54
Why Society Should Pay the True Costs of Security
..............56
Why Technology Won t Prevent Identity Theft
.................58
Terrorists May Use Google Earth, but Fear Is No Reason to Ban It.
.. 60
Thwarting an Internal Hacker
..............................62
An Enterprising Criminal Has Spotted a Gap in the Market
........65
We Shouldn t Poison Our Minds with Fear of
Bioterrorism
........66
Raising the Cost of Paperwork Errors Will Improve Accuracy
.......68
So-Called Cyberattack Was Overblown
......................70
Why Framing Your Enemies Is Now Virtually Child s Play
.........72
Beyond Security Theater
..................................73
Feeling and Reality
...................................74
Refuse to Be Terrorized
...............................76
Cold War Encryption Is Unrealistic in Today s Trenches
...........77
Profiling Makes Us Less Safe
...............................80
Fixing Intelligence Failures
................................81
Spy Cameras Won t Make Us Safer
..........................82
Scanners, Sensors Are Wrong Way to Secure the Subway
.........84
Preventing Terrorist Attacks in Crowded Areas
.................86
Where Are All the Terrorist Attacks?
......................... 87
Contents ix
Hard
to Pulł
Off
.....................................88
Few Terrorists
.......................................88
Small Attacks Aren t Enough
...........................89
Worst-Case Thinking Makes Us Nuts, Not Safe
.................89
Threat of Cyberwar Has Been Hugely Hyped
.................92
Cyberwar and the Future of Cyber Conflict
....................94
Why Terror Alert Codes Never Made Sense
...................96
Debate Club: An International Cyberwar Treaty Is the Only Way to
Stem the Threat
........................................97
Overreaction and Overly Specific Reactions to Rare Risks
.........99
Militarizing Cyberspace Will Do More Harm Than Good
.........101
Rhetoric of Cyber War Breeds Fear—and More Cyber War
.......103
Attacks from China
.................................103
GhostNet
.........................................104
Profitable
.........................................105
The Boston Marathon Bombing: Keep Calm and Carry On
......105
Why FBI and CIA Didn t Connect the Dots
...................107
The FBI s New Wiretapping Plan Is Great News for Criminals
.....109
US Offensive Cyberwar Policy
.............................112
Human Aspects of Security
.........................117
Secret Questions Blow a Hole in Security
....................117
When You Lose a Piece of Kit, the Real Loss Is the Data It Contains.
118
The Kindness of Strangers
...............................120
Blaming the User Is Easy—But It s Better to Bypass Them Altogether
..
122
The Value of Self-Enforcing Protocols
.......................123
Reputation Is Everything in IT Security
......................125
When to Change Passwords
..............................127
The Big Idea: Bruce Schneier
.............................129
High-Tech Cheats in a World of Trust
.......................131
χ
Contents
Detecting Cheaters
.....................................134
Lance Armstrong and the Prisoner s Dilemma of
Doping in Professional Sports
.............................137
The Doping Arms Race as Prisoner s Dilemma
.............138
The Ever-Evolving Problem
............................139
Testing and Enforcing
...............................140
Trust and Society
......................................141
How Secure Is the Papal Election?
..........................143
The Court of Public Opinion
..............................147
On Security Awareness Training
...........................150
Our New Regimes of Trust
...............................152
Privacy and Surveillance
..........................155
The Myth of the Transparent Society
.....................155
Our Data, Ourselves
....................................157
The Future of Ephemeral Conversation
......................158
How to Prevent Digital Snooping
..........................160
Architecture of Privacy
..................................162
Privacy in the Age of Persistence
...........................164
Should We Have an Expectation of Online Privacy?
............167
Offhand but On Record
.................................168
Google s and Facebook s Privacy Illusion
.....................171
The Internet: Anonymous Forever
..........................173
A Taxonomy of Social Networking Data
.....................175
The Difficulty of Surveillance Crowdsourcing
.................177
The Internet Is a Surveillance State
.........................179
Surveillance and the Internet of Things
......................181
Government Secrets and the Need for Whistleblowers
..........184
Before Prosecuting, Investigate the Government
..............187
Contents xl
5
Psychology of Security
............................189
The Security Mindset
...................................189
The Difference between Feeling and Reality in Security
.........191
How the Human Brain Buys Security
.......................194
Does Risk Management Make Sense?
.......................195
How the Great Conficker Panic Hacked into Human Credulity
.... 197
How Science Fiction Writers Can Help, or Hurt, Homeland Security
198
Privacy Salience and Social Networking Sites
.................201
Security, Group Size, and the Human Brain
..................203
People Understand Risks—But Do Security Staff Understand People?.
.
205
Nature s Fears Extend to Online Behavior
....................206
Security and Technology
..........................209
The Ethics of Vulnerability Research
........................209
I ve Seen the Future, and It Has a Kill Switch
..................211
Software Makers Should Take Responsibility
..................212
Lesson from the DNS Bug: Patching Isn t Enough
..............214
Why Being Open about Security Makes Us All
Safer in the Long Run
...................................216
Boston Court s Meddling with Full Disclosure Is Unwelcome
____218
Quantum Cryptography: As Awesome as It Is Pointless
.........220
Passwords Are Not Broken, but How We Choose Them Sure Is.
... 222
America s Next Top Hash Function Begins
...................223
Tigers Use Scent, Birds Use Calls—Biometrics Are
Just Animal Instinct
.....................................225
The Secret Question Is: Why Do IT Systems Use
Insecure Passwords?
....................................227
The Pros and Cons of Password Masking
....................229
Technology Shouldn t Give Big Brother a Head Start
...........231
Lockpicking and the Internet
.............................233
XU Contents
The Battle Is On against Facebook and Co. to
Regain Control of Our Files
...............................235
The Difficulty of Un-Authentication
........................237
Is
Antivirus
Dead?
......................................238
Virus and Protocol Scares Happen Every Day
—
but Don t Let Them Worry You
............................240
The Failure of Cryptography to Secure Modern Networks
.......242
The Story behind the Stuxnet Virus
........................244
The Dangers of a Software Monoculture
....................247
How Changing Technology Affects Security
..................249
The Importance of Security Engineering
.....................251
Technologies of Surveillance
..............................253
When Technology Overtakes Security
......................255
Rethinking Security
.................................255
7
Travel and Security
..............................259
Crossing Borders with Laptops and PDAs
....................259
The TSA s Useless Photo ID Rules
..........................261
The Two Classes of Airport Contraband
.....................262
Fixing Airport Security
..................................264
Laptop Security while Crossing Borders
.....................265
Breaching the Secure Area in Airports
......................268
Stop the Panic on Air Security
.............................269
A Waste of Money and Time
..............................271
Why the TSA Can t Back Down
............................273
The Trouble with Airport Profiling
.........................275
Security, Policy, Liberty, and Law
....................279
Memo to Next President: How to Get Cybersecurity Right
.......279
CRB Checking
........................................281
State Data Breach Notification Laws: Have They Helped?
........283
How to Ensure Police Database Accuracy
....................285
How Perverse Incentives Drive Bad Security Decisions
..........287
Contents xiii
It s Time to Drop the Expectation of Privacy Test
............288
Who Should Be in Charge of Cybersecurity?
..................291
Coordinate, but Distribute Responsibility
....................294
Zero Tolerance Really Means Zero Discretion
...............295
US Enables Chinese Hacking of Google
.....................297
Should the Government Stop Outsourcing
Code Development?
....................................299
Punishing Security Breaches
..............................300
Three Reasons to Kill the Internet Kill Switch Idea
..............302
Internet without Borders
.............................302
Unpredictable Side Effects
............................303
Security Flaws
.....................................303
Web Snooping Is a Dangerous Move
.......................304
The Plan to Quarantine Infected Computers
..................307
Close the Washington Monument
.........................310
Whitelisting and Blacklisting
..............................312
Securing Medical Research: a Cybersecurity Point of View
.......313
Fear Pays the Bills, but Accounts Must Be Settled
..............317
Power and the Internet
..................................319
Danger Lurks in Growing New Internet Nationalism
............321
IT for Oppression
......................................323
The Public/Private Surveillance Partnership
...................325
Transparency and Accountability Don t Hurt Security
—
They re Crucial to It
....................................327
It s Smart Politics to Exaggerate Terrorist Threats
..............329
References
.....................................333
Index
........................................347
|
any_adam_object | 1 |
author | Schneier, Bruce 1963- |
author_GND | (DE-588)123003180 |
author_facet | Schneier, Bruce 1963- |
author_role | aut |
author_sort | Schneier, Bruce 1963- |
author_variant | b s bs |
building | Verbundindex |
bvnumber | BV041627210 |
classification_rvk | QP 345 ST 277 |
classification_tum | DAT 460f DAT 050f DAT 055f |
ctrlnum | (OCoLC)881854969 (DE-599)GBV77305183X |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01655nam a2200409 c 4500</leader><controlfield tag="001">BV041627210</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140515 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140205s2014 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118790816</subfield><subfield code="c">Druckausg.</subfield><subfield code="9">978-1-118-79081-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118790822</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-118-79082-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881854969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV77305183X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schneier, Bruce</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123003180</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Carry on</subfield><subfield code="b">sound advice from Schneier on security</subfield><subfield code="c">Bruce Schneier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 356 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-79083-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027068191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027068191</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV041627210 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:01:16Z |
institution | BVB |
isbn | 9781118790816 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027068191 |
oclc_num | 881854969 |
open_access_boolean | |
owner | DE-83 DE-473 DE-BY-UBG DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-473 DE-BY-UBG DE-91G DE-BY-TUM |
physical | XVIII, 356 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Schneier, Bruce 1963- Verfasser (DE-588)123003180 aut Carry on sound advice from Schneier on security Bruce Schneier Indianapolis, Ind. Wiley 2014 XVIII, 356 S. txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf 1\p (DE-588)4522595-3 Fallstudiensammlung gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-1-118-79083-0 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027068191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Schneier, Bruce 1963- Carry on sound advice from Schneier on security Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4522595-3 |
title | Carry on sound advice from Schneier on security |
title_auth | Carry on sound advice from Schneier on security |
title_exact_search | Carry on sound advice from Schneier on security |
title_full | Carry on sound advice from Schneier on security Bruce Schneier |
title_fullStr | Carry on sound advice from Schneier on security Bruce Schneier |
title_full_unstemmed | Carry on sound advice from Schneier on security Bruce Schneier |
title_short | Carry on |
title_sort | carry on sound advice from schneier on security |
title_sub | sound advice from Schneier on security |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit Fallstudiensammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027068191&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT schneierbruce carryonsoundadvicefromschneieronsecurity |