Schneier on Security: Difference between revisions
(32 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
==Full Citation== | ==Full Citation== | ||
Bruce Schneier, Schneier on Security (2008) | Bruce Schneier, Schneier on Security (2008). | ||
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Schneier_B:2008 ''BibTeX''] | [http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=detailed&action=&keyword=Schneier_B:2008 ''BibTeX''] | ||
[http://books.google.com/books?id=tzyqfHr2oGAC&dq=Schneier+on+Security&ei=id1RTNXLNI2IygTxmojcCQ&cd=1 ''Google Books''] | |||
[http://www.worldcat.org/search?q=isbn:0470395354 ''World Cat''] | |||
[http://www.amazon.com/Schneier-Security-Bruce/dp/0470395354 ''Amazon''] | |||
[http://www.schneier.com/book-sos.html ''Purchase from the Author''] | |||
==Categorization== | ==Categorization== | ||
* [[Overview]] | |||
* Resource by Type: [[Books]] | |||
* Threats and Actors: [[Actors and Incentives]]; [[The Threat and Skeptics]]; [[Transportation]] | |||
* Issues: [[Metrics]]; [[Risk Management and Investment]]; [[Privacy]]; [[Usability/Human Factors]] | |||
* Approaches: [[Government Organizations]]; [[Regulation/Liability]] | |||
==Key Words== | ==Key Words== | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Data_Mining | Data Mining]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Identity_Fraud/Theft | Identity Fraud/Theft]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security Policy]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]], | |||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]] | |||
==Synopsis== | ==Synopsis== | ||
This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, security risks. | This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, security risks. While not primarily a treatise on cybersecurity (although several of the essays address cybersecurity), Schneier's insights are applicable to any security situation where limited resources make trade-offs necessary. | ||
[http:// | [http://www.amazon.com/gp/cdp/member-reviews/A1L5RDC8H9BB9S/ref=cm_cr_dp_auth_rev?ie=UTF8&sort_by=MostRecentReview Review by Ben Rothke] | ||
<blockquote> | <blockquote> | ||
<p>Perhaps no one in the world gets security like author Bruce Schneier does. | <p>Perhaps no one in the world gets security like author Bruce Schneier does. ... Schneier on Security is a collection of the best articles that Bruce has written from June 2002 to June 2008, mainly from his Crypto-Gram Newsletter, his blog, and other newspapers and magazine. The book is divided into 12 sections, covering nearly the entire range of security issues from terrorism, aviation, elections, economics, psychology, the business of security and much more. </p> | ||
<p>Two of the terms Schneier uses extensively throughout the book are intelligence and economics. From an intelligence perspective, he feels that Washington has spent far too much on hardware and other trendy security devices that create a sense of security theater. The security theater gives an aura and show of security, but in reality, has little real effect.</p> | <p>Two of the terms Schneier uses extensively throughout the book are intelligence and economics. From an intelligence perspective, he feels that Washington has spent far too much on hardware and other trendy security devices that create a sense of security theater. The security theater gives an aura and show of security, but in reality, has little real effect.</p> | ||
Line 48: | Line 64: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Expertise Required: None | |||
Table of Contents | Table of Contents | ||
Line 65: | Line 83: | ||
References | References | ||
Index | Index | ||
[http://www.schneier.com/blog/archives/2010/10/stuxnet.html Bruce Schneier's analysis of the Stuxnet worm] | |||
[http://www.schneier.com/ Bruce Schneier's blog covering security and security technology.] | |||
[http://www.schneier.com/crypto-gram-back.html Back issues] of Bruce Schneier's monthly email newsletter. (Most of the essays in this reference can be found here.) |
Latest revision as of 08:16, 8 October 2010
Full Title of Reference
Schneier on Security
Full Citation
Bruce Schneier, Schneier on Security (2008).
BibTeX Google Books World Cat Amazon Purchase from the Author
Categorization
- Overview
- Resource by Type: Books
- Threats and Actors: Actors and Incentives; The Threat and Skeptics; Transportation
- Issues: Metrics; Risk Management and Investment; Privacy; Usability/Human Factors
- Approaches: Government Organizations; Regulation/Liability
Key Words
Botnet, Cyber Crime, Data Mining, Department of Homeland Security, Disclosure Policy, Identity Fraud/Theft, Information Asymmetries, National Security Policy, Phishing, SPAM, Worm
Synopsis
This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, security risks. While not primarily a treatise on cybersecurity (although several of the essays address cybersecurity), Schneier's insights are applicable to any security situation where limited resources make trade-offs necessary.
Perhaps no one in the world gets security like author Bruce Schneier does. ... Schneier on Security is a collection of the best articles that Bruce has written from June 2002 to June 2008, mainly from his Crypto-Gram Newsletter, his blog, and other newspapers and magazine. The book is divided into 12 sections, covering nearly the entire range of security issues from terrorism, aviation, elections, economics, psychology, the business of security and much more.
Two of the terms Schneier uses extensively throughout the book are intelligence and economics. From an intelligence perspective, he feels that Washington has spent far too much on hardware and other trendy security devices that create a sense of security theater. The security theater gives an aura and show of security, but in reality, has little real effect.
The lack of intelligence is most manifest with airports, which are a perfect example of misguided security. Schneier notes that current trends in US airport security requires that people remove their shoes, due to a one-time incident with shoe-based explosive. Such an approach completely misses the point. Also, Schneier notes that the attempt to create a no-fly list, by feeding a limited set of characteristics into a computer, which is somehow expected to divine a person's terrorist leaning, is farcical.
Schneier therefore feels that the only way to effectively uncover terrorist plats is via intelligence and investigations, not via large-scale processing of everyone. Intelligence is an invaluable tool against terrorism, and the beauty of it is that it works regardless of what the terrorists are plotting. The bottom line according to Schneier in the book is that too much of the United State's counterterrorism security spending is not designed to protect us from the terrorists; but instead to protect public officials from criticism when another attack occurs.
Schneier also astutely notes that for the most part, security is not really so much of a technical issue, rather one of economics. A perfect example he gives is that of bulletproof vests. Since they are so effective, why doesn't everyone wear them all of the time? The reason people don't is that they do not think they are worth the cost. It is not worth the money or inconvenience, as the risk of being shot for most people is quite low. As a security consumer, people have made the calculation that not wearing a bulletproof vest is a good security trade-off. Schneier also notes that much of what is being proposed as national security is a bad security trade-off. It is not worth it and as consumers, the public is being ripped off.
Another recurring theme throughout the book is how the Bush administration has little by little eroded the Constitution, all in the name of fighting terrorism. Schneier notes that the brilliant framework the founding fathers created by creating divisions of power (executive, legislative, judicial) with checks and balances violates a basic unwritten rule, that the government should be granted only limited powers, and for limited purposes. Since there is a certainty that government powers will be abused.
Schneier observes that the USA PATRIOT is a perfect example of this abuse. The Constitution was designed and carefully outlines which powers each branch may exercise. While Schneier is best-known as a cryptographer and security expert, Schneier on Security also shows him to be a defender of the Constitution. In a number of essays in the book, he shows how unchecked presidential powers is bad not only for security, but for the preservation of democracy.
In chapter 8, on the topic of the economics of security, Schneier suggests a three-step program for improving computer and network security. He notes that none of them have anything to do with technology; they all have to do with businesses, economics, and people.
In chapter 9, on the psychology of security, Schneier writes that he tells people that if something is in the news, then they do not have to worry about it. He writes that the very definition of news is something that hardly ever happens. It's when something is not in the news, when it is so common that it is no longer news, drunk drivers killing people, domestic violence, deaths from diabetes, etc., that is when you should start worrying. And much of the terrorist threats that the Department of Homeland Security is spending tens of billions of dollars on, are those news threats, such as shoe bombers and liquid explosives that present very little real threat to the people of the US.
A fundamental theme of the book is that security is a trade-off. And far too many people have made the security trade-off without thinking if it is truly worth it. In essay after essay, Schenier challenges those assertions. Since 9/11, much has been given up in the name of terrorism, and that has been personal privacy and security. Schenier asks, has it been worth it?
Schneier on Security is an exceptionally important book that is overflowing with thought-provoking articles. Schneier gets above vague adages such as the war on terror and gets to the heart of the matter. His insight details what the real threats are, and what we should really be worrying about. The irony is that what Washington does is often the exact opposite of what should be done.
Much of the security carried out in the name of 9/11 has proven to be infective in the seven years since the attack. Schneier on Security is a manifesto of what should have been done, and what should be done. The book is eye-opening from the first page to the last. It lets you know that the next time you see grandma asked to take her shoes off by a TSA agent at the airport, why she is simply a bit player in the large security theater. And why spending tens of billions on a charade like that, makes that a tragedy of epic proportions.
Additional Notes and Highlights
Expertise Required: None
Table of Contents Introduction Terrorism and Security National Security Policy Airline Travel Privacy and Surveillance ID Cards and Security Election Security Security and Disasters Economics of Security Psychology of Security Business of Security Cybercrime and Cyberwar Computer and Information Security References Index
Bruce Schneier's analysis of the Stuxnet worm
Bruce Schneier's blog covering security and security technology.
Back issues of Bruce Schneier's monthly email newsletter. (Most of the essays in this reference can be found here.)