Главная
Study mode:
on
1
Introduction
2
Schneiers Top 10
3
Public Key Encryption
4
Ron Rivest
5
Crypto Punks
6
Chaos
7
Automation
8
Risk
9
Realworld example
10
They came to the market
11
You cannot automate everything
12
Visual analogy
13
Realworld examples
14
John McCann introduction
15
Everything is a computer
16
The Internet of Things
17
Extensibility
18
Complexity
19
New vulnerabilities
20
Attacks
21
Technology
22
Privacy Breach
23
Threats
24
Data Integrity Attacks
25
Data Availability Attacks
26
Computers fail differently
27
Glass House Hotel
28
Class Break
29
Failure
30
Patching
31
Embedded Systems
32
Car
33
Computer
34
Operating Systems
35
Computers
36
Authentication
37
Thing to Thing
38
Autonomous Car
39
RealTime Authentication
40
Supply Chain Security
41
Checkpoints
42
Policy can subvert technology
43
Two basic premises
44
The danger of building insecure phones
45
Design for a dirty network
46
The Internet question
47
Policy and legislation
48
Data security
Description:
Explore a comprehensive lecture by renowned security expert Bruce Schneier on privacy, trust, and the future of technology. Delve into Schneier's top 10 insights, covering topics such as public key encryption, crypto punks, automation, and risk assessment. Examine real-world examples illustrating the challenges of securing the Internet of Things and embedded systems. Investigate the complexities of modern technology, including data integrity attacks, availability threats, and the unique ways computers fail. Learn about authentication methods, supply chain security, and the importance of policy in shaping technological development. Gain valuable insights into designing secure systems for a "dirty network" and understand the critical role of legislation in data security. This thought-provoking talk, delivered at Edinburgh Napier University, offers a deep dive into the intersection of technology, privacy, and trust in our increasingly connected world.

Privacy, Trust and the Future of Cybersecurity

Bill Buchanan OBE
Add to list