Carry On: Sound Advice from Schneier on Security

Overview

For years, security sage Bruce Schneier has been warning usabout the true security risks in our wired-up world, and revealingthe illusions we construct to convince ourselves — wrongly— that we are safe.

He unmasked the smoke and mirrors behind airport security checksthat make us feel safer without actually making ussafer...why the FBI's wiretapping plan is in fact a boon to the badguys...how the trust essential to a functioning society has ...

See more details below
Hardcover
$24.62
BN.com price
(Save 17%)$29.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Hardcover)
  • All (33) from $4.19   
  • New (18) from $4.19   
  • Used (15) from $6.49   

Overview

For years, security sage Bruce Schneier has been warning usabout the true security risks in our wired-up world, and revealingthe illusions we construct to convince ourselves — wrongly— that we are safe.

He unmasked the smoke and mirrors behind airport security checksthat make us feel safer without actually making ussafer...why the FBI's wiretapping plan is in fact a boon to the badguys...how the trust essential to a functioning society has beenreplaced with security measures that merely alter the level ofrisk.

Now, in the aftermath of the Boston Marathon bombing andchemical attacks in Syria, Schneier presents this anthology of morethan 155 of his most insightful essays. Here you will findthought-provoking assessments of security and technology; thepsychological, human, business, and economic aspects of security;privacy and surveillance; crime, terrorism, spying, and war;liberty and law; and much, much more.

You'll discover

  • Why our computer security is a feudal system
  • How science fiction writers can affect homeland security
  • Why profiling actually makes us less safe
  • The myth of the transparent society
  • Google's and Facebook's privacy illusion
  • Why the FBI and CIA failed to connect the dots on the BostonMarathon bombers
  • The story behind the Stuxnet virus
  • Who should really be in charge of cybersecurity
  • How the US enabled the Chinese hacking of Google
  • Why scanners and sensors are the wrong way to secure the subwaysystem

Embark on this fascinating, unsettling journey into the realworld of 21st-century security. And pay attention. Our future is atstake.

Read More Show Less

Product Details

  • ISBN-13: 9781118790816
  • Publisher: Wiley
  • Publication date: 12/16/2013
  • Edition number: 1
  • Pages: 384
  • Sales rank: 624,250
  • Product dimensions: 6.20 (w) x 9.10 (h) x 1.40 (d)

Meet the Author

Bruce Schneier

BRUCE SCHNEIER is an internationally renowned security technologist who studies the human side of security. A prolific author, he has produced hundreds of articles, essays, and academic papers, as well as 11 books that together have sold over 500,000 copies. He has testified before Congress, is a frequent guest on television and radio, and is regularly quoted in the press. His blog and monthly newsletter at www.schneier.com reach over 250,000 devoted readers worldwide.

Read More Show Less

Table of Contents

Introduction xv

1 The Business and Economics of Security 1

Consolidation: Plague or Progress 1

Prediction: RSA Conference Will Shrink Like a Punctured Balloon2

How to Sell Security 4

Why People Are Willing to Take Risks 4

How to Sell Security 6

Why Do We Accept Signatures by Fax? 7

The Pros and Cons of LifeLock 9

The Problem Is Information Insecurity 12

Security ROI: Fact or Fiction? 14

The Data Imperative 15

Caveat Emptor 16

Social Networking Risks 17

Do You Know Where Your Data Are? 18

Be Careful When You Come to Put Your Trust in the Clouds 21

Is Perfect Access Control Possible? 22

News Media Strategies for Survival for Journalists 24

Security and Function Creep 26

Weighing the Risk of Hiring Hackers 27

Should Enterprises Give In to IT Consumerization at the Expenseof Security? 29

The Vulnerabilities Market and the Future of Security 30

So You Want to Be a Security Expert 33

When It Comes to Security, We’re Back to Feudalism 34

I Pledge Allegiance to the United States of Convenience 35

The Good, the Bad, and the Ugly 36

You Have No Control Over Security on the Feudal Internet 37

2 Crime, Terrorism, Spying, and War 41

America’s Dilemma: Close Security Holes, or Exploit ThemOurselves 41

Are Photographers Really a Threat? 43

CCTV Doesn’t Keep Us Safe, Yet the Cameras Are Everywhere45

Chinese Cyberattacks: Myth or Menace? 47

How a Classic Man-in-the-Middle Attack Saved Colombian Hostages48

How to Create the Perfect Fake Identity 51

A Fetishistic Approach to Security Is a Perverse Way to Keep UsSafe 52

The Seven Habits of Highly Ineffective Terrorists 54

Why Society Should Pay the True Costs of Security 56

Why Technology Won’t Prevent Identity Theft 58

Terrorists May Use Google Earth, but Fear Is No Reason to Ban It60

Thwarting an Internal Hacker 62

An Enterprising Criminal Has Spotted a Gap in the Market 65

We Shouldn’t Poison Our Minds with Fear of Bioterrorism66

Raising the Cost of Paperwork Errors Will Improve Accuracy68

So-Called Cyberattack Was Overblown 70

Why Framing Your Enemies Is Now Virtually Child’s Play72

Beyond Security Theater 73

Feeling and Reality 74

Refuse to Be Terrorized 76

Cold War Encryption Is Unrealistic in Today’s Trenches77

Profiling Makes Us Less Safe 80

Fixing Intelligence Failures 81

Spy Cameras Won’t Make Us Safer 82

Scanners, Sensors Are Wrong Way to Secure the Subway 84

Preventing Terrorist Attacks in Crowded Areas 86

Where Are All the Terrorist Attacks? 87

Hard to Pull Off 88

Few Terrorists 88

Small Attacks Aren’t Enough 89

Worst-Case Thinking Makes Us Nuts, Not Safe 89

Threat of “Cyberwar” Has Been Hugely Hyped 92

Cyberwar and the Future of Cyber Conflict 94

Why Terror Alert Codes Never Made Sense 96

Debate Club: An International Cyberwar Treaty Is the Only Way toStem the Threat 97

Overreaction and Overly Specific Reactions to Rare Risks 99

Militarizing Cyberspace Will Do More Harm Than Good 101

Rhetoric of Cyber War Breeds Fear—and More Cyber War103

Attacks from China 103

GhostNet 104

Profitable 105

The Boston Marathon Bombing: Keep Calm and Carry On 105

Why FBI and CIA Didn’t Connect the Dots 107

The FBI’s New Wiretapping Plan Is Great News for Criminals109

US Offensive Cyberwar Policy 112

3 Human Aspects of Security 117

Secret Questions Blow a Hole in Security 117

When You Lose a Piece of Kit, the Real Loss Is the Data ItContains 118

The Kindness of Strangers 120

Blaming the User Is Easy—But It’s Better to BypassThem Altogether 122

The Value of Self-Enforcing Protocols 123

Reputation Is Everything in IT Security 125

When to Change Passwords 127

The Big Idea: Bruce Schneier 129

High-Tech Cheats in a World of Trust 131

Detecting Cheaters 134

Lance Armstrong and the Prisoner’s Dilemma of Doping inProfessional Sports 137

The Doping Arms Race as Prisoner’s Dilemma 138

The Ever-Evolving Problem 139

Testing and Enforcing 140

Trust and Society 141

How Secure Is the Papal Election? 143

The Court of Public Opinion 147

On Security Awareness Training 150

Our New Regimes of Trust 152

4 Privacy and Surveillance 155

The Myth of the “Transparent Society” 155

Our Data, Ourselves 157

The Future of Ephemeral Conversation 158

How to Prevent Digital Snooping 160

Architecture of Privacy 162

Privacy in the Age of Persistence 164

Should We Have an Expectation of Online Privacy? 167

Offhand but On Record 168

Google’s and Facebook’s Privacy Illusion 171

The Internet: Anonymous Forever 173

A Taxonomy of Social Networking Data 175

The Difficulty of Surveillance Crowdsourcing 177

The Internet Is a Surveillance State 179

Surveillance and the Internet of Things 181

Government Secrets and the Need for Whistleblowers 184

Before Prosecuting, Investigate the Government 187

5 Psychology of Security 189

The Security Mindset 189

The Difference between Feeling and Reality in Security 191

How the Human Brain Buys Security 194

Does Risk Management Make Sense? 195

How the Great Conficker Panic Hacked into Human Credulity197

How Science Fiction Writers Can Help, or Hurt, Homeland Security198

Privacy Salience and Social Networking Sites 201

Security, Group Size, and the Human Brain 203

People Understand Risks—But Do Security Staff UnderstandPeople? 205

Nature’s Fears Extend to Online Behavior 206

6 Security and Technology 209

The Ethics of Vulnerability Research 209

I’ve Seen the Future, and It Has a Kill Switch 211

Software Makers Should Take Responsibility 212

Lesson from the DNS Bug: Patching Isn’t Enough 214

Why Being Open about Security Makes Us All Safer in the Long Run216

Boston Court’s Meddling with “Full Disclosure”Is Unwelcome 218

Quantum Cryptography: As Awesome as It Is Pointless 220

Passwords Are Not Broken, but How We Choose Them Sure Is 222

America’s Next Top Hash Function Begins 223

Tigers Use Scent, Birds Use Calls—Biometrics Are JustAnimal Instinct 225

The Secret Question Is: Why Do IT Systems Use InsecurePasswords? 227

The Pros and Cons of Password Masking 229

Technology Shouldn’t Give Big Brother a Head Start 231

Lockpicking and the Internet 233

The Battle Is On against Facebook and Co. to Regain Control ofOur Files 235

The Difficulty of Un-Authentication 237

Is Antivirus Dead? 238

Virus and Protocol Scares Happen Every Day— butDon’t Let Them Worry You 240

The Failure of Cryptography to Secure Modern Networks 242

The Story behind the Stuxnet Virus 244

The Dangers of a Software Monoculture 247

How Changing Technology Affects Security 249

The Importance of Security Engineering 251

Technologies of Surveillance 253

When Technology Overtakes Security 255

Rethinking Security 255

7 Travel and Security 259

Crossing Borders with Laptops and PDAs 259

The TSA’s Useless Photo ID Rules 261

The Two Classes of Airport Contraband 262

Fixing Airport Security 264

Laptop Security while Crossing Borders 265

Breaching the Secure Area in Airports 268

Stop the Panic on Air Security 269

A Waste of Money and Time 271

Why the TSA Can’t Back Down 273

The Trouble with Airport Profiling 275

8 Security, Policy, Liberty, and Law 279

Memo to Next President: How to Get Cybersecurity Right 279

CRB Checking 281

State Data Breach Notification Laws: Have They Helped? 283

How to Ensure Police Database Accuracy 285

How Perverse Incentives Drive Bad Security Decisions 287

It’s Time to Drop the “Expectation of Privacy”Test 288

Who Should Be in Charge of Cybersecurity? 291

Coordinate, but Distribute Responsibility 294

“Zero Tolerance” Really Means Zero Discretion 295

US Enables Chinese Hacking of Google 297

Should the Government Stop Outsourcing Code Development? 299

Punishing Security Breaches 300

Three Reasons to Kill the Internet Kill Switch Idea 302

Internet without Borders 302

Unpredictable Side Effects 303

Security Flaws 303

Web Snooping Is a Dangerous Move 304

The Plan to Quarantine Infected Computers 307

Close the Washington Monument 310

Whitelisting and Blacklisting 312

Securing Medical Research: a Cybersecurity Point of View 313

Fear Pays the Bills, but Accounts Must Be Settled 317

Power and the Internet 319

Danger Lurks in Growing New Internet Nationalism 321

IT for Oppression 323

The Public/Private Surveillance Partnership 325

Transparency and Accountability Don’t Hurt Security—They’re Crucial to It 327

It’s Smart Politics to Exaggerate Terrorist Threats329

References 333

Index 347

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)