Overview
Syllabus
Introduction
Schneiers Top 10
Public Key Encryption
Ron Rivest
Crypto Punks
Chaos
Automation
Risk
Realworld example
They came to the market
You cannot automate everything
Visual analogy
Realworld examples
John McCann introduction
Everything is a computer
The Internet of Things
Extensibility
Complexity
New vulnerabilities
Attacks
Technology
Privacy Breach
Threats
Data Integrity Attacks
Data Availability Attacks
Computers fail differently
Glass House Hotel
Class Break
Failure
Patching
Embedded Systems
Car
Computer
Operating Systems
Computers
Authentication
Thing to Thing
Autonomous Car
RealTime Authentication
Supply Chain Security
Checkpoints
Policy can subvert technology
Two basic premises
The danger of building insecure phones
Design for a dirty network
The Internet question
Policy and legislation
Data security
Taught by
Bill Buchanan OBE