000 04284nam a22006135i 4500
001 978-3-319-74950-1
003 DE-He213
005 20210511121952.0
007 cr nn 008mamaa
008 180219s2018 gw | s |||| 0|eng d
020 _a9783319749501
_9978-3-319-74950-1
024 7 _a10.1007/978-3-319-74950-1
_2doi
050 4 _aQA76.9.A25
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
100 1 _aLysne, Olav.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_96828
245 1 4 _aThe Huawei and Snowden Questions
_h[electronic resource] :
_bCan Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? /
_cby Olav Lysne.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXIV, 116 p. 6 illus., 5 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSimula SpringerBriefs on Computing ;
_v4
505 0 _a1 Introduction -- 2 Trust -- 3 What is an ICT-System? -- 4 Development of ICT Systems -- 5 Theoretical Foundation -- 6 Reverse Engineering of Code -- 7 Static Detection of Malware -- 8 Dynamic Detection Methods -- 9 Formal Methods -- 10 Software Quality and Quality Management -- 11 Containment of Untrusted Modules -- 12 Summary and Way Forward.
506 0 _aOpen Access
520 _aPreliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states. .
650 0 _aComputer security.
_9213
650 0 _aComputer engineering.
_96829
650 0 _aManagement information systems.
_9148
650 0 _aComputer science.
_91566
650 0 _aPolitical science.
_91113
650 0 _aEconomic policy.
_96830
650 1 4 _aPrivacy.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28010
_94680
650 2 4 _aComputer Engineering.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I27000
_96831
650 2 4 _aManagement of Computing and Information Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24067
_91569
650 2 4 _aGovernance and Government.
_0https://scigraph.springernature.com/ontologies/product-market-codes/911220
_92824
650 2 4 _aR & D/Technology Policy.
_0https://scigraph.springernature.com/ontologies/product-market-codes/W43000
_96832
710 2 _aSpringerLink (Online service)
_9141
776 0 8 _iPrinted edition:
_z9783319749495
776 0 8 _iPrinted edition:
_z9783319749518
830 0 _aSimula SpringerBriefs on Computing ;
_v4
_94861
856 4 0 _uhttps://doi.org/10.1007/978-3-319-74950-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SOB
942 _cEBK
_w1
_xAdministrator Library
_y1
_z Administrator Library
999 _c1400
_d1400
773 _tSpringer Nature Open Access eBook