Bruce Schneier on Future Digital Threats
نویسنده
چکیده
Bruce Schneier is without question one of the leading computer security professionals alive today. A true renaissance man when it comes to IT security, he has been involved in the creation of a host of cryptographic algorithms (for example, Blowfish, Twofish, and Threefish); has written several books on cryptography and security topics, the most recent of which is Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (W.W. Norton & Company, 2016); has extensive academic publications; is a prolific writer for magazines, newspapers, and his own blog (schneier.com); and serves the profession through his appointment as fellow at Harvard’s Berkman Klein Center for Internet & Security and board membership to the Electronic Frontier Foundation. He’s currently CTO for IBM Resilient. This “interview” resulted from our e-mail exchanges during November and December 2017. STUXNET AND CYBERPHYSICAL SYSTEMS
منابع مشابه
Nonsecurity Considerations in Security Decisions
• You can have as much security as you want – What are you willing to give up to get it? • Security always involves trade-offs – If no airplanes flew, 9/11 couldn't have happened – Gated communities offer more security but less privacy • We make decisions every day about these trade-offs • To do it thoughtfully, we must understand: – How security works – The threats and risks – The costs
متن کاملAn Authenticated Camera
We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific camera at a specific time and specific place. These protocols require interaction between the camera and base station both before and after a series of images are
متن کاملTDDC03 Projects, Spring 2006 A Comparison of Attack Trees Threat Modeling and OCTAVE
Avoidance and discovery of security vulnerabilities in information systems and managing enterprises requires awareness of typical risks and a good understanding of vulnerabilities and threats and their exploitations. Various methods for characterizing, identifying and managing threats have been presented. Bruce Schneier has invented the Attack Trees, Microsoft call their method Threat Modeling ...
متن کاملAttacks on Cryptographic Hashes in Internet Protocols
Attacks on Cryptographic Hashes in Internet Protocols Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols n...
متن کاملAutomatic Event-Stream Notarization Using Digital Signatures
Some digital signature algorithms (such as RSA) require messages to be padded before they are signed. Secure tokens can use these padding bits as a subliminal channel to embed auditing information in their signed messages. These auditing bits simplify protecting against lost and stolen tokens, breaks of specific protocols, hash functions, and ciphers, and attacks based on defeating a token’s ta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Computer
دوره 51 شماره
صفحات -
تاریخ انتشار 2018