In under a century, our digital lifestyle went from a theoretical possibility, to a crude and novel tinkering, to a full blown reality. In the present 21st century, for many of us the digital lifestyle is inescapable. We do not choose to live online, we must live online. Whether it is for the sake of earning a living, or interfacing with the government, or even staying out of the way of physical harm, the fact that our lives have been dedicated to the network of electronic devices means that we are now exposed to new modes of criminality, abuse, and even espionage. Perhaps most disturbing of all, is the fact that among the billions who now have regular access to the Internet and live at least part of their lives online, only a fraction of a percent seem to be aware of the need to make specific efforts to secure themselves and their assets in and through the digital realm.
Cybersecurity for Daily Living
Cybersecurity is a domain nearly as broad and as deep as the digital realm itself. Becoming an expert in even the smallest area will require a lifetime's work. Nonetheless, there is no putting it off, and no trusting it to other people to look out for our best interests. How we live online and in the digital realm today may very well govern the quality of life our to which our children and grandchildren are heir.
The Purpose of This Project
These pages are for the sake of collecting notes and links with regard to the most pressing topics in relation to making the digital life secure. In part cybersecurity is a technological problem: patches, protocols, designs, bugs and flaws must be tackled. However, it has become clear that ultimately no amount of technological advance will ever circumvent the human element in personal and organizational information security. So, while we may make notes on how devices and systems can be improved, the first and most important step is to make the commitment to vigilance.
- Policy and Law
- Community News
- Secure User Interface Design
- Software Security
- Hardware Security
- Information Theory, Computer Science, and Mathematics
Cybersecurity Reading List
- The C Programming Language Copy 1 Copy 2
- PC Assembly Language
- Introduction to Modern Cryptography
- Intellectual Property Protection in VLSI Designs
- Active Hardware Metering for Intellectual Property Protection and Security
- FPGAs for Dummies
- Hardware Metering: A Survey
- A Primer on Hardware Security: Models, Methods, and Metrics