YoVDO

Bruce Schneier: Privacy, Trust and the Future - Edinburgh Napier University

Offered By: The Cyber Academy via YouTube

Tags

Cybersecurity Courses RSA Conference Courses Privacy Courses Risk Assessment Courses Supply Chain Security Courses

Course Description

Overview

Explore a comprehensive lecture on privacy, trust, and the future of cybersecurity delivered by renowned security expert Bruce Schneier at Edinburgh Napier University. Delve into Schneier's Top 10 cybersecurity concepts, including public key encryption, RSA, and the law of encryption. Examine the roles of crypto punks and chaos in the market, while considering the impact of automation and risk assessment. Analyze the increasing complexity of our digital world, from the Internet of Things to embedded systems, and understand how these advancements create new vulnerabilities. Investigate the challenges of authentication, supply chain security, and the importance of policy and legislation in addressing cybersecurity issues. Gain insights into the future of cybersecurity and the need for robust defense strategies in an increasingly interconnected world.

Syllabus

Introduction
Schneiers Top 10
Public Key Encryption
RSA
Law of Encryption
Characters
Crypto Punks
Chaos in the Market
Automation
Risk
Visual Analogy
RealWorld Examples
Sir John McCann
Everything is a computer
The Internet of Things
Extensibility
Complexity
New vulnerabilities
Faster computers
Clocks
Whats different
Threats
Integrity Availability
Computers fail differently
Glass House Hotel
Class Breaks
Security Failures
Microphone Fail
Patching
Agile
Embedded Systems
Car analogy
Computer analogy
Operating systems
Legacy computers
Authentication
Thing to Thing Authentication
Adhoc Authentication
Supply Chain Security
Checkpoint
Android
Policy vs Technology
Defense has to dominate
All aspects of everything we do
We can design for a dirty network
The internet question
Policy and legislation
Government involvement


Taught by

The Cyber Academy

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Supply Chain and Operations Management Tips
LinkedIn Learning
Kubernetes Security: Implementing Supply Chain Security
Pluralsight
Implement Cybersecurity Best Practices in Your Organization
Salesforce via Trailhead
ISC2 Certified Secure Software Life-Cycle Professional (CSSLP)
Cybrary