ebook img

Beyond Fear: Thinking Sensibly About Security In An Uncertain World PDF

304 Pages·2003·1.363 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Beyond Fear: Thinking Sensibly About Security In An Uncertain World

Beyond Fear This page intentionally left blank Beyond Fear Thinking Sensibly About Security in an Uncertain World Bruce Schneier COPERNICUS BOOKS An Imprint of Springer-Verlag © 2003 Bruce Schneier All rights reserved.No part of this publication may be reproduced,stored in a retrieval system, or transmitted,in any form or by any means,electronic,mechanical,photocopying,recording, or otherwise,without the prior written permission of the publisher. Published in the United States by Copernicus Books, an imprint of Springer-Verlag New York,Inc. A member of BertelsmannSpringer Science+Business Media GmbH Copernicus Books 37 East 7th Street New York,NY 10003 www.copernicusbooks.com Library ofCongress Cataloging-in-Publication Data Schneier,Bruce Beyond fear : thinking sensibly about security in an uncertain world/Bruce Schneier. p. cm. Includes index. ISBN 0-387-02620-7 (alk.paper) 1.Terrorism--United States--Prevention. 2.War on Terrorism,2001– I. Title. HV6432.S36 2003 363.3'2--dc21 2003051488 Manufactured in the United States of America. Printed on acid-free paper. 9 8 7 6 5 4 3 2 1 ISBN 0-387-02620-7 SPIN 10926468 To My Parents This page intentionally left blank Contents Part One: Sensible Security 1. All Security Involves Trade-offs 3 2. Security Trade-offs Are Subjective 17 3. Security Trade-offs Depend on Power and Agenda 33 Part Two: How Security Works 4. Systems and How They Fail 47 5. Knowing the Attackers 59 6. Attackers Never Change Their Tunes,Just Their Instruments 73 7. Technology Creates Security Imbalances 87 8. Security Is a Weakest-Link Problem 103 9. Brittleness Makes for Bad Security 119 10. Security Revolves Around People 133 11. Detection Works Where Prevention Fails 147 12. Detection Is Useless Without Response 167 13. Identification,Authentication,and Authorization 181 14. All Countermeasures Have Some Value, But No Countermeasure Is Perfect 207 15. Fighting Terrorism 233 Part Three: The Game of Security 16. Negotiating for Security 257 17. Security Demystified 271 Author’s Note 282 Acknowledgments 283 Index 285 This page intentionally left blank Part One Sensible Security

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.