Completed
The danger of building insecure phones
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Privacy, Trust and the Future of Cybersecurity
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Schneiers Top 10
- 3 Public Key Encryption
- 4 Ron Rivest
- 5 Crypto Punks
- 6 Chaos
- 7 Automation
- 8 Risk
- 9 Realworld example
- 10 They came to the market
- 11 You cannot automate everything
- 12 Visual analogy
- 13 Realworld examples
- 14 John McCann introduction
- 15 Everything is a computer
- 16 The Internet of Things
- 17 Extensibility
- 18 Complexity
- 19 New vulnerabilities
- 20 Attacks
- 21 Technology
- 22 Privacy Breach
- 23 Threats
- 24 Data Integrity Attacks
- 25 Data Availability Attacks
- 26 Computers fail differently
- 27 Glass House Hotel
- 28 Class Break
- 29 Failure
- 30 Patching
- 31 Embedded Systems
- 32 Car
- 33 Computer
- 34 Operating Systems
- 35 Computers
- 36 Authentication
- 37 Thing to Thing
- 38 Autonomous Car
- 39 RealTime Authentication
- 40 Supply Chain Security
- 41 Checkpoints
- 42 Policy can subvert technology
- 43 Two basic premises
- 44 The danger of building insecure phones
- 45 Design for a dirty network
- 46 The Internet question
- 47 Policy and legislation
- 48 Data security