|
Showing 1 - 3 of
3 matches in All Departments
Much debate has been given as to whether computer security is
improved through the full disclosure of security vulnerabilities
versus keeping the problems private and unspoken. Although there is
still tension between those who feel strongly about the subject, a
middle ground of responsible disclosure seems to have emerged.
Unfortunately, just as we've moved into an era with more
responsible disclosure, it would seem that a market has emerged for
security vulnerabilities and zero day exploits. Disclosure of
Security Vulnerabilities: Legal and Ethical Issues considers both
the ethical and legal issues involved with the disclosure of
vulnerabilities and explores the ways in which law might respond to
these challenges.
|
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Matthew Bernhard, Andrea Bracciali, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, …
|
R3,323
Discovery Miles 33 230
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of two workshops
held at the 24th International Conference on Financial Cryptography
and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February
2020. The 39 full papers and 3 short papers presented in this book
were carefully reviewed and selected from 73 submissions. The
papers feature four Workshops: The 1st Asian Workshop on Usable
Security, AsiaUSEC 2020, the 1st Workshop on Coordination of
Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in
Secure Electronic Voting, VOTING 2020, and the 4th Workshop on
Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop
contributes an increase of the scientific quality of research in
human factors in security and privacy. In terms of improving
efficacy of secure systems, the research included an extension of
graphical password authentication. Further a comparative study of
SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified
strengths in each and refined the need for improvements in security
testing tools. The CoDeFi Workshop discuss multi-disciplinary
issues regarding technologies and operations of decentralized
finance based on permissionless blockchain. The workshop consists
of two parts; presentations by all stakeholders, and unconference
style discussions. The VOTING Workshop cover topics like new
methods for risk-limited audits, new ethods to increase the
efficiency of mixnets, verification of security of voting schemes
election auditing, voting system efficiency, voting system
usability, and new technical designs for cryptographic protocols
for voting systems, and new way of preventing voteselling by
de-incentivising this via smart contracts. The WTSC Workshop
focuses on smart contracts, i.e., self-enforcing agreements in the
form of executable programs, and other decentralized applications
that are deployed to and run on top of specialized blockchains.
How will governments and courts protect civil liberties in this new
era of hacktivism? Ethical Hacking discusses the attendant moral
and legal issues. The first part of the 21st century will likely go
down in history as the era when ethical hackers opened governments
and the line of transparency moved by force. One need only read the
motto "we open governments" on the Twitter page for Wikileaks to
gain a sense of the sea change that has occurred. Ethical hacking
is the non-violent use of a technology in pursuit of a
cause-political or otherwise-which is often legally and morally
ambiguous. Hacktivists believe in two general but spirited
principles: respect for human rights and fundamental freedoms,
including freedom of expression and personal privacy; and the
responsibility of government to be open, transparent and fully
accountable to the public. How courts and governments will deal
with hacking attempts which operate in a grey zone of the law and
where different ethical views collide remains to be seen. What is
undisputed is that Ethical Hacking presents a fundamental
discussion of key societal questions. A fundamental discussion of
key societal questions. This book is published in English. - La
premiere moitie du XXIe siecle sera sans doute reconnue comme
l'epoque ou le piratage ethique a ouvert de force les
gouvernements, deplacant les limites de la transparence. La page
twitter de Wikileaks enchasse cet ethos a meme sa devise, " we open
governments ", et sa volonte d'etre omnipresent. En parallele, les
grandes societes de technologie comme Apple se font competition
pour produire des produits de plus en plus securitaires et a
proteger les donnees de leurs clients, alors meme que les
gouvernements tentent de limiter et de decrypter ces nouvelles
technologies d'encryption. Entre-temps, le marche des
vulnerabilites en matiere de securite augmente a mesure que les
experts en securite informatique vendent des vulnerabilites de
logiciels des grandes technologies, dont Apple et Google, contre
des sommes allant de 10 000 a 1,5 million de dollars. L'activisme
en securite est a la hausse. Le piratage ethique est l'utilisation
non-violence d'une technologie quelconque en soutien d'une cause
politique ou autre qui est souvent ambigue d'un point de vue
juridique et moral. Le hacking ethique peut designer les actes de
verification de penetration professionnelle ou d'experts en
securite informatique, de meme que d'autres formes d'actions
emergentes, comme l'hacktivisme et la desobeissance civile en
ligne. L'hacktivisme est une forme de piratage ethique, mais
egalement une forme de militantisme des droits civils a l'ere
numerique. En principe, les adeptes du hacktivisme croient en deux
grands principes : le respect des droits de la personne et les
libertes fondamentales, y compris la liberte d'expression et a la
vie privee, et la responsabilite des gouvernements d'etre ouverts,
transparents et pleinement redevables au public. En pratique,
toutefois, les antecedents comme les agendas des hacktivistes sont
fort diversifies. Il n'est pas clair de quelle facon les tribunaux
et les gouvernements traiteront des tentatives de piratage eu egard
aux zones grises juridiques, aux approches ethiques conflictuelles,
et compte tenu du fait qu'il n'existe actuellement, dans le monde,
presque aucune exception aux provisions, en matiere de cybercrime
et de crime informatique, liees a la recherche sur la securite ou
l'interet public. Il sera egalement difficile de determiner le lien
entre hacktivisme et droits civils. Ce livre est publie en anglais.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Tenet
John David Washington, Robert Pattinson, …
DVD
R53
Discovery Miles 530
|