𝔖 Scriptorium
✦   LIBER   ✦

📁

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

✍ Scribed by John Viega


Publisher
Apress
Year
2009
Tongue
English
Leaves
262
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Книга The Myths of Security: What the Computer Security Industry Doesn't Want... The Myths of Security: What the Computer Security Industry Doesn't Want You to KnowКниги Компьютерная безопасность Автор: John Viega Год издания: 2009 Формат: pdf Издат.:Apress Страниц: 238 Размер: 2 ISBN: 9780596523022 Язык: Английский0 (голосов: 0) Оценка:If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:Why it's easier for bad guys to "own" your computer than you think Why anti-virus software doesn't work well -- and one simple way to fix it Whether Apple OS X is more secure than Windows What Windows needs to do better How to make strong authentication pervasive Why patch management is so bad Whether there's anything you can do about identity theft Five easy steps for fixing application security, and moreProvocative, insightful, and always controversial, The Myths of Security not only addresses IT professionals who deal with security issues, but also speaks to Mac and PC users who spend time online.

✦ Table of Contents


Contents......Page 7
Foreword......Page 11
Preface......Page 15
Why Myths of Security?......Page 17
Acknowledgments......Page 18
How to Contact Us......Page 20
Safari® Books Online......Page 21
The Security Industry Is Broken......Page 23
Security: Nobody Cares!......Page 27
It’s Easier to Get “0wned” Than You Think......Page 31
It’s Good to Be Bad......Page 41
Test of a Good Security Product: Would I Use It?......Page 47
Why Microsoft’s Free AV Won’t Matter......Page 51
Google Is Evil......Page 55
Why Most AV Doesn’t Work (Well)......Page 63
Why AV Is Often Slow......Page 71
Four Minutes to Infection?......Page 77
Personal Firewall Problems......Page 81
Call It “Antivirus”......Page 87
Why Most People Shouldn’t Run Intrusion Prevention Systems......Page 93
Problems with Host Intrusion Prevention......Page 97
Plenty of Phish in the Sea......Page 101
The Cult of Schneier......Page 109
Helping Others Stay Safe on the Internet......Page 113
Snake Oil: Legitimate Vendors Sell It, Too......Page 117
Living in Fear?......Page 121
Is Apple Really More Secure?......Page 127
OK, Your Mobile Phone Is Insecure; Should You Care?......Page 131
Do AV Vendors Write Their Own Viruses?......Page 135
One Simple Fix for the AV Industry......Page 137
Open Source Security: A Red Herring......Page 141
Why SiteAdvisor Was Such a Good Idea......Page 149
Is There Anything We Can Do About Identity Theft?......Page 151
Virtualization: Host Security’s Silver Bullet?......Page 157
When Will We Get Rid of All the Security Vulnerabilities?......Page 161
Application Security on a Budget......Page 167
“Responsible Disclosure” Isn’t Responsible......Page 175
Are Man-in-the-Middle Attacks a Myth?......Page 185
An Attack on PKI......Page 189
HTTPS Sucks; Let’s Kill It!......Page 193
CrAP-TCHA and the Usability/Security Tradeoff......Page 197
No Death for the Password......Page 203
Spam Is Dead......Page 209
Improving Authentication......Page 213
Cloud Insecurity?......Page 219
What AV Companies Should Be Doing (AV 2.0)......Page 225
VPNs Usually Decrease Security......Page 235
Usability and Security......Page 237
Privacy......Page 239
Anonymity......Page 241
Improving Patch Management......Page 243
An Open Security Industry......Page 245
Academics......Page 247
Locksmithing......Page 249
Critical Infrastructure......Page 251
Epilogue......Page 253
Index......Page 255


📜 SIMILAR VOLUMES


The Myths of Security: What the Computer
✍ John Viega 📂 Library 📅 2009 🏛 O'Reilly Media 🌐 English

<DIV><p>If you think computer security has improved in recent years, <I>The Myths of Security</I> will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestion

The Myths of Security: What the Computer
✍ John Viega 📂 Library 📅 2009 🏛 Oreily 🌐 English

<DIV><p>If you think computer security has improved in recent years, <I>The Myths of Security</I> will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestion

Smokescreen: What the Marijuana Industry
✍ Kevin A. Sabet 📂 Library 📅 2021 🏛 Forefront Books 🌐 English

<B> <BR> </B><BR>From the leading authority on marijuana&#8212;a man who has served as White House advisor on drugs to three different administrations and who NBC News once called "the prodigy of drug politics"&#8212;comes the remarkable and shocking expos&eacute; about how 21st century pot, today's

Inside Internet Security: What Hackers D
✍ Jeff Crume 📂 Library 📅 2000 🏛 Addison-Wesley Professional 🌐 English

This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It arms systems administrators with a thorough understanding of the problems of network security and their solutions, and thus helps realize

Inside Internet Security: What Hackers D
✍ Jeff Crume 📂 Library 📅 2000 🏛 Addison-Wesley Professional 🌐 English

Hackers know things that you don't. That's their edge. It's the reason that they are able to break into networks, leaving a path of destruction in their wake. This book discusses some of the tricks of the hacker trade - things that are well known in the hacker community but all too foreign to the I/