Overview
Syllabus
Introduction
Schneiers Top 10
Public Key Encryption
RSA
Law of Encryption
Characters
Crypto Punks
Chaos in the Market
Automation
Risk
Visual Analogy
RealWorld Examples
Sir John McCann
Everything is a computer
The Internet of Things
Extensibility
Complexity
New vulnerabilities
Faster computers
Clocks
Whats different
Threats
Integrity Availability
Computers fail differently
Glass House Hotel
Class Breaks
Security Failures
Microphone Fail
Patching
Agile
Embedded Systems
Car analogy
Computer analogy
Operating systems
Legacy computers
Authentication
Thing to Thing Authentication
Adhoc Authentication
Supply Chain Security
Checkpoint
Android
Policy vs Technology
Defense has to dominate
All aspects of everything we do
We can design for a dirty network
The internet question
Policy and legislation
Government involvement
Taught by
The Cyber Academy