Ebook:Amazon | Amazon.co.uk | Barnes & Noble | Apple iBooks Store
Click Here to Kill Everybody
Security and Survival in a Hyper-connected World
A Book by Bruce Schneier
The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now.
From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing.
Table of Contents
Introduction: Everything is Becoming a Computer
Part 1: The Trends
1. Computers Are Still Hard to Secure
2. Patching Is Failing as a Security Paradigm
3. Knowing Who’s Who on the Internet Is Getting Harder
4. Everyone Favors Insecurity
5. Risks are Becoming Catastrophic
Part 2: The Solutions
6. What a Secure Internet+ Looks Like
7. How We Can Secure the Internet+
8. Government Is Who Enables Security
9. How Governments Can Prioritize Defense Over Offense
10. Plan B: What’s Likely to Happen
11. Where Policy Can Go Wrong
12. Towards a Trusted, Resilient, and Peaceful Internet+
Conclusion: Bring Technology and Policy Together
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.