PDF Listening In Cybersecurity in an Insecure Age Susan Landau 9780300244427 Books
A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers​
New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election.
And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election.
And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
PDF Listening In Cybersecurity in an Insecure Age Susan Landau 9780300244427 Books
"Great read from an expert teacher. Susan Landau always gets right to the point, as an astute observer of the cybersecurity and privacy fields."
Product details
|
Tags : Listening In Cybersecurity in an Insecure Age [Susan Landau] on . <DIV><B>A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers​</B><BR /><BR /> New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal,Susan Landau,Listening In Cybersecurity in an Insecure Age,Yale University Press,0300244428,COMPUTERS / Security / Online Safety Privacy,General Adult,INTERNET SECURITY,Internet/General,NATIONAL SECURITY ISSUES,Non-Fiction,POLITICAL SCIENCE / Security (National International),Political Science/Security (National International),UNIVERSITY PRESS,hacker; iphone; FBI; federal bureau of investigation; national security administration; NSA; spying; strong encryption; cybersecurity; surveillance; apple; google; terrorism; san bernadino; public policy; manifesto; android; vulnerabilities; dual authentication; cyberattack; telecom; wiretap,hacker;iphone;FBI;federal bureau of investigation;national security administration;NSA;spying;strong encryption;cybersecurity;surveillance;apple;google;terrorism;san bernadino;public policy;manifesto;android;vulnerabilities;dual authentication;cyberattack;telecom;wiretap
Listening In Cybersecurity in an Insecure Age Susan Landau 9780300244427 Books Reviews :
Listening In Cybersecurity in an Insecure Age Susan Landau 9780300244427 Books Reviews
- This book explains to all of us the tension between insuring privacy via encryption and easing law enforcement by requiring "exceptional access" to break encryption. This is NOT a technical book about how it all works, but a book full of examples of how phones, computers, and their suppliers have improved privacy protection AND how law enforcement has continued to catch bad guys with effective investigations, despite lacking CONTENT of private communications. If you're like me and prefer to build understanding from the ground up (examples, cases) rather than trying to infer what politicians and public officials mean by broad, often hyperbolic, generalizations ("we're going dark"), this is a great book. It's short, it's to the point, it's well written, and an engaging read.
- An up to date discussion of the tension between strong privacy protection for private individuals and law enforcement’s need to track and capture criminals. Every citizen of every democracy needs to read this accessible accounting by one of the founding experts in the field of information security. Especially important is the treatment of what’s at risk of cyberwarfare/cyber mischief by states and state-sponsored entities. Completely documented with footnotes and published by a renowned university press, yet totally free of academic jargon, this is a highly recommended read.
- For a tech security professional, this book may not cover as much technical detail as one may want, but it covers a great broad range of the worldwide threats to cyber security .
- [NOTE I received a copy of this book through NetGalley.]
An interesting foray into encryption and privacy, especially when considering the point of view of authorities who may need to access data on devices seized upon arrests.
The author makes a case for strengthened encryption, and I feel this makes more sense than the contrary. The book is positioned around the main controversy of including backdoors to allow police and intelligence services to access a device, so that when they need to do it during an investigation, to apprehend a perp or to follow the trail of other people potentially involved, they could do so easily; whereas strong encryption would make it difficult or impossible. However, as has been discussed during actual investigations (an example given in the book involves Apple), there’d be no guarantees that in-built backdoors would be used only by authorities if they’re here, sooner or later someone with ill intentions is bound to find them and use them, too.
This ties into a general concern about how we have evolved into a digital age, and have to envision security from this perspective. Here also, while not going into deep technical details, the book explains the principles underlying this new brand of security; how this or that method works; the pros and cons of going towards more encryption or less encryption; what other solutions have already been tested, especially in military environments; how cyber-attacks can disrupt governmental operations in many different ways, such as what happened with Estonia and Georgia, and even the 2016 US elections. All very current and hot issues that deserve to be pointed at and examined, because whatever solutions get implemented, if they create less security and impinge on civilian privacy as well, they’re not going to be useful for very long (if ever).
Also interesting, even though it’s not the main focus, is the concept of encryption methods needing to be made public in order to be really efficient the more people have a chance of poking at them, testing them, and finding faults, the more these methods can be revised and strengthened.
Conclusion Not a very technical book, but that’s precisely why it makes a good introduction to such matters easy to understand, while highlighting major concerns that not only deal with national security, but with our own (and with our privacy) as well. - This is a readable, engaging, yet technically accurate description of current threats against privacy and their effects on commerce as well as on individuals. It persuasively, with specific examples, outlines alternatives to the FBI insistence on back-door access to computer communications. If you think it is only individual privacy that is at stake, or if you think law enforcement requires back-door access in order to "keep us safe" and to "catch terrorists", you need to read this book. Susan Landau has worked in this field for many years, teaching, researching, writing, and testifying before Congress and other bodies. This is a voice respected in the cybersecurity community.
- Haven't finished it but the descriptions of various security measures and the kinds of hacks and breaches that compromise systems
all seemed rather vague. I know it's not a textbook on cybersecurity but I would have preferred more detail in the explanations of how these things work. I was hoping for a gentle introduction to cryptography and cybersecurity that would have explained things in more detail than https being a secure browser protocol for credit card transactions and such. It kind of feels like the main point of the book is that allowing government back-doors into security systems is the wrong way to go. - Great resource for people that aren't sure what the pros and cons of strong encryption are. This book clearly explains why every day people need it, and why the companies that make secure products don't want to compromise them, or you, with weaker encryption or back doors.
- Great read from an expert teacher. Susan Landau always gets right to the point, as an astute observer of the cybersecurity and privacy fields.
No comments:
Post a Comment