ABSTRACT
In June 2013 Edward Snowden leaked a large collection of documents that describe the capabilities and technologies of the NSA and its allies. Even to security experts the scale, nature and impact of some of the techniques revealed was surprising. A major consequence is the increased awareness of the public at large of the existence of highly intrusive mass surveillance techniques. There has also been some impact in the business world, including a growing interest in companies that (claim to) develop end-to-end secure solutions. There is no doubt that large nation states and organized crime have carefully studied the techniques and are exploring which ones they can use for their own benefit. But after two years, there is little progress in legal or governance measures to address some of the excesses by increasing accountability. Moreover, the security research community seems to have been slow to respond to the new threat landscape. In this lecture we analyze these threats and speculate how they could be countered.
Index Terms
- Post-Snowden Threat Models
Recommendations
A Threat Table Based Assessment of Information Security in Telemedicine
Information security within healthcare is paramount and telemedicine applications present unique security challenges. Technology is giving rise to new and advanced telemedicine applications and understanding the security threats to these applications is ...
Do we need a holistic approach for the design of secure IoT systems?
CF'17: Proceedings of the Computing Frontiers ConferenceIn this paper, four cryptography and security experts point out to future research directions in internet-of-things (IoT) security. Coming from different research domains, the experts address a broad range of issues related to IoT security. In ...
Internet Security Protection in Personal Sensitive Information
CIS '14: Proceedings of the 2014 Tenth International Conference on Computational Intelligence and SecurityAt the present, personal sensitive information protection is faced with serious situation. In order to solve the problems in personal sensitive information protection in internet, the model of security protection in personal sensitive information is ...
Comments