Completed
Risk
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Bruce Schneier: Privacy, Trust and the Future - Edinburgh Napier University
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Schneiers Top 10
- 3 Public Key Encryption
- 4 RSA
- 5 Law of Encryption
- 6 Characters
- 7 Crypto Punks
- 8 Chaos in the Market
- 9 Automation
- 10 Risk
- 11 Visual Analogy
- 12 RealWorld Examples
- 13 Sir John McCann
- 14 Everything is a computer
- 15 The Internet of Things
- 16 Extensibility
- 17 Complexity
- 18 New vulnerabilities
- 19 Faster computers
- 20 Clocks
- 21 Whats different
- 22 Threats
- 23 Integrity Availability
- 24 Computers fail differently
- 25 Glass House Hotel
- 26 Class Breaks
- 27 Security Failures
- 28 Microphone Fail
- 29 Patching
- 30 Agile
- 31 Embedded Systems
- 32 Car analogy
- 33 Computer analogy
- 34 Operating systems
- 35 Legacy computers
- 36 Authentication
- 37 Thing to Thing Authentication
- 38 Adhoc Authentication
- 39 Supply Chain Security
- 40 Checkpoint
- 41 Android
- 42 Policy vs Technology
- 43 Defense has to dominate
- 44 All aspects of everything we do
- 45 We can design for a dirty network
- 46 The internet question
- 47 Policy and legislation
- 48 Government involvement