logo for Pluto Press
Biohackers
The Politics of Open Science
Alessandro Delfanti
Pluto Press, 2013

Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information. Alessandro Delfanti argues that the combination of the ethos of 20th century science, the hacker movement and the free software movement is producing an open science culture which redefines the relationship between researchers, scientific institutions and commercial companies.

Biohackers looks at the emergence of the citizen biology community ‘DIYbio’, the shift to open access by the American biologist Craig Venter and the rebellion of the Italian virologist Ilaria Capua against WHO data-sharing policies.

Delfanti argues that these biologists and many others are involved in a transformation of both life sciences and information systems, using open access tools and claiming independence from both academic and corporate institutions.

[more]

logo for The Institution of Engineering and Technology
Code of Practice for Cyber Security in the Built Environment
The Institution of Engineering and Technology
The Institution of Engineering and Technology, 2014
This Code of Practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment.
[more]

front cover of Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
[more]

front cover of Cyber Blockades
Cyber Blockades
Alison Lawlor Russell
Georgetown University Press, 2014

Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare.

The author defines and explains the emerging concept of “cyber blockades” and presents a unique comparison of blockade operations in five different domains—on land, at sea, in the air, in space, and in cyberspace—identifying common elements as well as important distinctions. Alison Lawlor Russell’s framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War.

Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare.

[more]

logo for The Institution of Engineering and Technology
Cybersecurity in Transport Systems
Martin Hawley
The Institution of Engineering and Technology, 2022
The role of data and information and communication technology (ICT) is growing in all areas of transport, with autonomous vehicles among the most advanced examples. This opens up opportunities for malevolent interference, such as remote-control of vehicles for criminal or terrorist purposes or interruption of increasingly interconnected transport systems. It is therefore imperative that cybersecurity is upgraded and designed into new systems.
[more]

logo for Georgetown University Press
Fixing American Cybersecurity
Creating a Strategic Public-Private Partnership
Larry Clinton
Georgetown University Press, 2023

Advocates a cybersecurity “social contract” between government and business in seven key economic sectors

Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.

A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.

Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.

[more]

front cover of Futureproof
Futureproof
Security Aesthetics and the Management of Life
D. Asher Ghertner, Daniel M. Goldstein, and Hudson McFann, editors
Duke University Press, 2020
Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard infrastructures and invisible technologies assumed to deliver it: walls, turnstiles, CCTV cameras, digital encryption, and the like. The contributors to Futureproof redirect this focus, showing how security is a sensory domain shaped by affect and image as much as rules and rationalities. They examine security as it is lived and felt in domains as varied as real estate listings, active-shooter drills, border crossings, landslide maps, gang graffiti, and museum exhibits to theorize how security regimes are expressed through aesthetic forms. Taking a global perspective with studies ranging from Jamaica to Jakarta and Colombia to the U.S.-Mexico border, Futureproof expands our understanding of the security practices, infrastructures, and technologies that pervade everyday life.

Contributors. Victoria Bernal, Jon Horne Carter, Alexandra Demshock, Zaire Z. Dinzey-Flores, Didier Fassin, D. Asher Ghertner, Daniel M. Goldstein, Rachel Hall, Rivke Jaffe, Ieva Jusionyte, Catherine Lutz, Alejandra Leal Martínez, Hudson McFann, Limor Samimian-Darash, AbdouMaliq Simone, Austin Zeiderman
[more]

front cover of Integrating Social Media into Information Systems
Integrating Social Media into Information Systems
Requirements, Gaps, and Potential Solutions
Douglas Yeung, Douglas
RAND Corporation, 2018
This report examines the technical challenges associated with incorporating bulk, automated analysis of social media information into procedures for vetting people seeking entry into the United States. The authors identify functional requirements and a framework for operational metrics for the proposed social media screening capabilities and provide recommendations on how to implement those capabilities.
[more]

front cover of Mobile Biometrics
Mobile Biometrics
Guodong Guo
The Institution of Engineering and Technology, 2017
Mobile biometrics - the use of physical and/or behavioral characteristics of humans to allow their recognition by mobile/smart phones - aims to achieve conventional functionality and robustness while also supporting portability and mobility, bringing greater convenience and opportunity for its deployment in a wide range of operational environments from consumer applications to law enforcement. But achieving these aims brings new challenges such as issues with power consumption, algorithm complexity, device memory limitations, frequent changes in operational environment, security, durability, reliability, and connectivity. Mobile Biometrics provides a timely survey of the state of the art research and developments in this rapidly growing area.
[more]

front cover of The Next Billion Users
The Next Billion Users
Digital Life Beyond the West
Payal Arora
Harvard University Press, 2019

A digital anthropologist examines the online lives of millions of people in China, India, Brazil, and across the Middle East—home to most of the world’s internet users—and discovers that what they are doing is not what we imagine.

New-media pundits obsess over online privacy and security, cyberbullying, and revenge porn, but do these things really matter in most of the world? The Next Billion Users reveals that many assumptions about internet use in developing countries are wrong.

After immersing herself in factory towns, slums, townships, and favelas, Payal Arora assesses real patterns of internet usage in India, China, South Africa, Brazil, and the Middle East. She finds Himalayan teens growing closer by sharing a single computer with common passwords and profiles. In China’s gaming factories, the line between work and leisure disappears. In Riyadh, a group of young women organizes a YouTube fashion show.

Why do citizens of states with strict surveillance policies appear to care so little about their digital privacy? Why do Brazilians eschew geo-tagging on social media? What drives young Indians to friend “foreign” strangers on Facebook and give “missed calls” to people? The Next Billion Users answers these questions and many more. Through extensive fieldwork, Arora demonstrates that the global poor are far from virtuous utilitarians who mainly go online to study, find jobs, and obtain health information. She reveals habits of use bound to intrigue everyone from casual internet users to developers of global digital platforms to organizations seeking to reach the next billion internet users.

[more]

front cover of Olympic-Caliber Cybersecurity
Olympic-Caliber Cybersecurity
Lessons for Safeguarding the 2020 Games and Other Major Events
Cynthia Dion-Schwarz
RAND Corporation, 2018
Understanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.
[more]

front cover of RFID Protocol Design, Optimization, and Security for the Internet of Things
RFID Protocol Design, Optimization, and Security for the Internet of Things
Alex X. Liu
The Institution of Engineering and Technology, 2018
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage.
[more]

logo for Georgetown University Press
Russian Cyber Operations
Coding the Boundaries of Conflict
Scott Jasper
Georgetown University Press, 2023

Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring states—all while maintaining a thin veneer of deniability and avoiding strikes that cross the line into acts of war. How should a targeted nation respond? In Russian Cyber Operations, Scott Jasper dives into the legal and technical maneuvers of Russian cyber strategies, proposing that nations develop solutions for resilience to withstand future attacks.

Jasper examines the place of cyber operations within Russia’s asymmetric arsenal and its use of hybrid and information warfare, considering examples from French and US presidential elections and the 2017 NotPetya mock ransomware attack, among others. A new preface to the paperback edition puts events since 2020 into context. Jasper shows that the international effort to counter these operations through sanctions and indictments has done little to alter Moscow’s behavior. Jasper instead proposes that nations use data correlation technologies in an integrated security platform to establish a more resilient defense.

Russian Cyber Operations provides a critical framework for determining whether Russian cyber campaigns and incidents rise to the level of armed conflict or operate at a lower level as a component of competition. Jasper’s work offers the national security community a robust plan of action critical to effectively mounting a durable defense against Russian cyber campaigns.

[more]

front cover of Security for Mobility
Security for Mobility
Chris J. Mitchell
The Institution of Engineering and Technology, 2004
Over the last two decades, mobile telecommunications has grown dramatically, from a small niche technology to a massive industry. Mobile telephones are now ubiquitous, and the divisions between PCs, PDAs, mobile telephones and other mobile devices are becoming increasingly blurred. Against this background, the security of information of both the devices themselves, and the information handled by these devices, is becoming ever more important.
[more]

front cover of Technological Turf Wars
Technological Turf Wars
A Case Study of the Computer Antivirus Industry
Jessica Johnston
Temple University Press, 2008

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.

Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives—does the industry release viruses to generate demand for antivirus software?—and considers the dynamics within companies by looking at facets such as gender bias and power politics. Technological Turf Wars is an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.

[more]

front cover of Trusted Computing
Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
[more]

front cover of Trusted Platform Modules
Trusted Platform Modules
Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
[more]

front cover of User-Centric Privacy and Security in Biometrics
User-Centric Privacy and Security in Biometrics
Claus Vielhauer
The Institution of Engineering and Technology, 2018
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability.
[more]

front cover of Zero Days, Thousands of Nights
Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]


Send via email Share on Facebook Share on Twitter