The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Simula SpringerBriefs on Computing)
暫譯: 華為與斯諾登問題:不受信任的供應商的電子設備能否被驗證?不受信任的供應商能否在電子設備中建立信任? (Simula SpringerBriefs on Computing)

Olav Lysne

  • 出版商: Springer
  • 出版日期: 2018-03-01
  • 售價: $1,150
  • 貴賓價: 9.5$1,093
  • 語言: 英文
  • 頁數: 116
  • 裝訂: Paperback
  • ISBN: 3319749498
  • ISBN-13: 9783319749495
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Preliminary

This book is open access under a CC BY 4.0 license.

This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers?  In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward.  

In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security.

This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.

 

商品描述(中文翻譯)

初步

本書在 CC BY 4.0 授權下開放存取。

本書回答了兩個核心問題:首先,從不可信的供應商處採購的電子設備是否有可能進行驗證?其次,我能否以某種方式在我的產品中建立信任,以支持不信任的客戶進行驗證?本書在不同的章節中帶領讀者了解計算機科學領域的最新技術,這些技術能夠對這些問題提供啟示。在結尾章節中,討論了現實可行的前進方向。

在網絡安全的討論中,通常隱含著設備製造商會與設備使用者合作,以阻止第三方的不法行為。斯諾登檔案和最近對中國設備在西方國家關鍵基礎設施中使用的討論改變了這一點。在這兩種情況下,討論的焦點圍繞著惡意製造商可能對其自身客戶造成的傷害,以及此事的重要性與國家安全問題相當。

本書對於需要清楚理解副標題中提出的兩個問題的資訊通信技術(ICT)和安全專業人士,以及工業、國家機構和國家決策者來說,具有極大的興趣。