Overview
Introduction
Living in a Cyber World
by Robert Keating
Section 1: The Hacker
1.1 The Hacker in your Hardware
by John Villasenor
1.2 Hacking the Lights Out
by David M. Nicol
1.3 The Attack of Code Red
by Carolyn P. Meinel
1.4 Attack of the Worms
by Michael Moyer
Section 2: Nowhere to Hide
2.1 The End of Privacy?
by Daniel J. Solove
2.2 Stealing Secrets
by W. Wayt Gibbs
2.3 Brave New World of Wiretapping
by Whitfield Diffie and Susan Landau
2.4 Tag-- You’re It
by Katherine Albrecht
2.5 Malware Goes Mobile
by Mikko Hypponen
2.6 The Ultimate Database
by Simson L. Garfinkel
Section 3: The Solutions
3.1 How to Keep Secrets Safe
by Anna Lysyanskaya
3.2 Improving Online Security
by John Rennie, et al.
3.3 Can Phishing Be Foiled?
by Lorrie Faith Cranor
3.4 Beyond Fingerprinting
by Anil K. Jain and Sharath Pankanti