Bruce Schneier: Privacy, Trust and the Future - Edinburgh Napier University
Offered By: The Cyber Academy via YouTube
Course Description
Overview
Syllabus
Introduction
Schneiers Top 10
Public Key Encryption
RSA
Law of Encryption
Characters
Crypto Punks
Chaos in the Market
Automation
Risk
Visual Analogy
RealWorld Examples
Sir John McCann
Everything is a computer
The Internet of Things
Extensibility
Complexity
New vulnerabilities
Faster computers
Clocks
Whats different
Threats
Integrity Availability
Computers fail differently
Glass House Hotel
Class Breaks
Security Failures
Microphone Fail
Patching
Agile
Embedded Systems
Car analogy
Computer analogy
Operating systems
Legacy computers
Authentication
Thing to Thing Authentication
Adhoc Authentication
Supply Chain Security
Checkpoint
Android
Policy vs Technology
Defense has to dominate
All aspects of everything we do
We can design for a dirty network
The internet question
Policy and legislation
Government involvement
Taught by
The Cyber Academy
Related Courses
Master Mathematical Cryptography 2020: Crack Any CodeUdemy Cryptography from Scratch| Master Cryptography in Java
Udemy Information Security in Python
Udemy Cryptography
Caleb Curry via YouTube Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube