Главная
Study mode:
on
1
Introduction
2
Schneiers Top 10
3
Public Key Encryption
4
RSA
5
Law of Encryption
6
Characters
7
Crypto Punks
8
Chaos in the Market
9
Automation
10
Risk
11
Visual Analogy
12
RealWorld Examples
13
Sir John McCann
14
Everything is a computer
15
The Internet of Things
16
Extensibility
17
Complexity
18
New vulnerabilities
19
Faster computers
20
Clocks
21
Whats different
22
Threats
23
Integrity Availability
24
Computers fail differently
25
Glass House Hotel
26
Class Breaks
27
Security Failures
28
Microphone Fail
29
Patching
30
Agile
31
Embedded Systems
32
Car analogy
33
Computer analogy
34
Operating systems
35
Legacy computers
36
Authentication
37
Thing to Thing Authentication
38
Adhoc Authentication
39
Supply Chain Security
40
Checkpoint
41
Android
42
Policy vs Technology
43
Defense has to dominate
44
All aspects of everything we do
45
We can design for a dirty network
46
The internet question
47
Policy and legislation
48
Government involvement
Description:
Explore a comprehensive lecture on privacy, trust, and the future of cybersecurity delivered by renowned security expert Bruce Schneier at Edinburgh Napier University. Delve into Schneier's Top 10 cybersecurity concepts, including public key encryption, RSA, and the law of encryption. Examine the roles of crypto punks and chaos in the market, while considering the impact of automation and risk assessment. Analyze the increasing complexity of our digital world, from the Internet of Things to embedded systems, and understand how these advancements create new vulnerabilities. Investigate the challenges of authentication, supply chain security, and the importance of policy and legislation in addressing cybersecurity issues. Gain insights into the future of cybersecurity and the need for robust defense strategies in an increasingly interconnected world.

Bruce Schneier: Privacy, Trust and the Future - Edinburgh Napier University

The Cyber Academy
Add to list
0:00 / 0:00