Cybersecurity

In under a century, our digital lifestyle went from a theoretical possibility, to a crude and novel tinkering, to a full blown reality. In the present 21st century, for many of us the digital lifestyle is inescapable. We do not choose to live online, we must live online. Whether it is for the sake of earning a living, or interfacing with the government, or even staying out of the way of physical harm, the fact that our lives have been dedicated to the network of electronic devices means that we are now exposed to new modes of criminality, abuse, and even espionage. Perhaps most disturbing of all, is the fact that among the billions who now have regular access to the Internet and live at least part of their lives online, only a fraction of a percent seem to be aware of the need to make specific efforts to secure themselves and their assets in and through the digital realm.

Cybersecurity for Daily Living

Cybersecurity is a domain nearly as broad and as deep as the digital realm itself. Becoming an expert in even the smallest area will require a lifetime's work. Nonetheless, there is no putting it off, and no trusting it to other people to look out for our best interests. How we live online and in the digital realm today may very well govern the quality of life our to which our children and grandchildren are heir.

The Purpose of This Project

These pages are for the sake of collecting notes and links with regard to the most pressing topics in relation to making the digital life secure. In part cybersecurity is a technological problem: patches, protocols, designs, bugs and flaws must be tackled. However, it has become clear that ultimately no amount of technological advance will ever circumvent the human element in personal and organizational information security. So, while we may make notes on how devices and systems can be improved, the first and most important step is to make the commitment to vigilance.

Cybersecurity Reading List

  1. The C Programming Language Copy 1 Copy 2
  2. PC Assembly Language
  3. Introduction to Modern Cryptography
  4. Intellectual Property Protection in VLSI Designs
  5. Active Hardware Metering for Intellectual Property Protection and Security
  6. FPGAs for Dummies
  7. Hardware Metering: A Survey
  8. A Primer on Hardware Security: Models, Methods, and Metrics


Cybersecurity Topics
The policies of governments, standards bodies, industry organizations and even large companies have an impact on the cybersecurity landscape. The intention of policy and law is to prevent or remediate criminality, abuse and even espionage.
The news produced by and for the cybersecurity community is markedly different than the news that is produced for general public consumption. Many cybersecurity have an engineering or computer science background, and as such, there is an appreciably lower tolerance for bias, spin, and fake news. Still, take anything you read online with a grain of salt, and keep reading, because we are unlikely to ever hear the final word, on anything of interest.
"...Software is malleable and easily changed. This quality is advantageous to core functionality, but is harmful to security as well as performance...' "Last minute changes to design -- and future improvements -- are easily accommodated. But this malleability creates a broader surface for attack."
Someday I will have something intelligent to say about hardware security. Hopefully, someday soon.
Cryptography is the art of making an intentional message unreadable to anyone who does not know/have the key. The art of cryptography is informed by mathematics and computer science. Cryptography is an all or nothing game: once your cipher is broken, all your efforts are lost. But until then, you are undefeatable.
So much to learn, so little time. Of course, cybersecurity is an interdisciplinary filed, and a subfield, of several other important fields of knowledge. Namely: information theory, computer science, and mathematics. There are of course other important areas, but I think for right now my interest lies mainly in these three areas, and these are the sorts of notes I would like to keep here.