Click here to kill everybody Security and survival in a hyper-connected world

Bruce Schneier, 1963-

Book - 2018

"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the ris...ks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--

Saved in:

2nd Floor Show me where

005.8/Schneier
0 / 1 copies available
Location Call Number   Status
2nd Floor 005.8/Schneier Due Nov 29, 2024
Subjects
Published
New York : W.W. Norton & Company [2018]
Language
English
Main Author
Bruce Schneier, 1963- (author)
Edition
First edition
Physical Description
viii, 319 pages ; 25 cm
Bibliography
Includes bibliographical references (pages 231-308) and index.
ISBN
9780393608885
  • Introduction: Everything Is Becoming A Computer
  • Part I. The Trends
  • 1. Computers Are Still Hard To Secure
  • 2. Patching Is Failing As A Security Paradigm
  • 3. Knowing Who's Who On The Internet Is Getting Harder
  • 4. Everyone Favors Insecurity
  • 5. Risks Are Becoming Catastrophic
  • Part II. The Solutions
  • 6. What A Secure Internet+ Looks Like
  • 7. How We Can Secure The Internet+
  • 8. Government Is Who Enables Security
  • 9. How Governments Can Prioritize Defense Over Offense
  • 10. Plan B: What's Likely To Happen
  • 11. Where Policy Can Go Wrong
  • 12. Towards A Trusted, Resilient, And Peaceful Internet+
  • Conclusion: Bring Technology And Policy Together
  • Acknowledgments
  • Notes
  • Index
  • About The Author
Review by Publisher's Weekly Review

Schneier (Data and Goliath), a fellow at the Berkman Center for Internet and Society at Harvard University, provides a clear perspective on the threat posed by the evolution of the internet into what is commonly referred to as the "internet of things." As "everything is becoming a computer... on the Internet," with even pedestrian items such as light bulbs or refrigerators collecting, using, and communicating data, the convenience and efficiency of such "smart" technology comes at the cost of increased vulnerability to the schemes of crafty hackers. Horror stories, such as a vehicle's controls being taken over remotely, are not new, but Schneier's vast experience enables him to tie together many strands and put them in context. For example, after discussing the inherent security issues with software (there are "undiscovered vulnerabilities in every piece"), Schneier goes on to observe that such flaws are only part of the problem; he convincingly demonstrates that a major, if not the main, reason, for an insecure internet is that its "most powerful architects-governments and corporations-have manipulated the network to make it serve their own interests." Schneier concedes that his book has "a gaping hole" in not explaining how his nuanced recommendations for increasing security and resilience could become policy, but it is a useful introduction to the dimensions of the challenge. (Sept.) © Copyright PWxyz, LLC. All rights reserved.


Review by Library Journal Review

Seasoned technologist and security writer Schneier's (Data and Goliath; Liars and Outliers) work springboards from the "Internet of Things" (IoT), or the network of physical devices including cars, electronics, machinery, that connect to one another and exchange data. For this work, the author coins the term Internet+, taken to mean "the Internet + Things + us." By offering a broad introduction to the concept, Schneier aims to familiarize readers to topics and issues surrounding it and to draft a road map toward solutions. Such an approach is challenging; the introductory chapters address IoT concerns that more informed readers may already be aware of, whereas the later, more technical chapters are too specialized for general audiences. Readers who enjoyed Andrew Blum's Tubes: A Journey to the Center of the Internet will be similarly intrigued by Schneier's close study. VERDICT This detailed introduction to Internet+/IoT educates new readers about the domain while offering heavier content for those more familiar with network security topics.-Esther Jackson, New York Botanical Garden © Copyright 2018. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.

(c) Copyright Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.
Review by Kirkus Book Review

Big Brother is watching and scheming and up to no goodand, writes security technologist Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, 2015), it looks like he's winning.By way of an opening gambit, the author posits three scenarios in which hackers take over machines and computer systems, from printers to power plants, both to demonstrate their ability to do so and to show how the interdependence of the web can easily be put to work against us. In one of those scenarios, real-world to the core, Russian hackers came into a Ukrainian power plant through a malware backdoor, "then remotely took control of the center's computers and turned the power off." That's not just a threat to life, but it also erodes trust in social and economic systems, the basis for civil society. In another scenario, which gives the book its title, a "bio-printer" is hacked to "print a killer virus"and does. Given all this, why don't the governments and corporations of the world band together to do a better job of cybersecurity? Because, Schneier answers, there are powerful forces that thrive on the "wicked problem" of cybersecurity and insecurity, for one thing; for another, "big companies with few competitors don't have much incentive to improve the security of their products, because users have no alternative." With due pessimism, the author argues that individuals must do their best to harden their own security even as governments battle against encryption, anonymity, and other security measures by claiming that the "Four Horsemen of the Internet Apocalypseterrorists, drug dealers, pedophiles, and organized crime"will be the ultimate beneficiaries of secure systems. On a larger level, Schneier proposes resilient systems that provide multiple defensive layers as well as reform of international laws and the establishment of protocols for enhanced protection against the real bad guys.Useful for an internet user but particularly for those concerned with privacy, civil liberties, and related issues. Copyright Kirkus Reviews, used with permission.

Copyright (c) Kirkus Reviews, used with permission.