Privacy, Trust and the Future of Cybersecurity

Privacy, Trust and the Future of Cybersecurity

Bill Buchanan OBE via YouTube Direct link

Embedded Systems

31 of 48

31 of 48

Embedded Systems

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Privacy, Trust and the Future of Cybersecurity

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Schneiers Top 10
  3. 3 Public Key Encryption
  4. 4 Ron Rivest
  5. 5 Crypto Punks
  6. 6 Chaos
  7. 7 Automation
  8. 8 Risk
  9. 9 Realworld example
  10. 10 They came to the market
  11. 11 You cannot automate everything
  12. 12 Visual analogy
  13. 13 Realworld examples
  14. 14 John McCann introduction
  15. 15 Everything is a computer
  16. 16 The Internet of Things
  17. 17 Extensibility
  18. 18 Complexity
  19. 19 New vulnerabilities
  20. 20 Attacks
  21. 21 Technology
  22. 22 Privacy Breach
  23. 23 Threats
  24. 24 Data Integrity Attacks
  25. 25 Data Availability Attacks
  26. 26 Computers fail differently
  27. 27 Glass House Hotel
  28. 28 Class Break
  29. 29 Failure
  30. 30 Patching
  31. 31 Embedded Systems
  32. 32 Car
  33. 33 Computer
  34. 34 Operating Systems
  35. 35 Computers
  36. 36 Authentication
  37. 37 Thing to Thing
  38. 38 Autonomous Car
  39. 39 RealTime Authentication
  40. 40 Supply Chain Security
  41. 41 Checkpoints
  42. 42 Policy can subvert technology
  43. 43 Two basic premises
  44. 44 The danger of building insecure phones
  45. 45 Design for a dirty network
  46. 46 The Internet question
  47. 47 Policy and legislation
  48. 48 Data security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.