Ciencias de la Seguridad

29 downloads 0 Views 3MB Size Report
Porque la seguridad informática es tan compleja que sólo mediante un recorrido sistemático alrededor de ella, un ingeniero podrá abarcarla. ▫Porque nuestro ...
Sergio Ellerbracke

▪Porque la seguridad informática es por naturaleza multidisciplinaria. ▪Porque la seguridad informática es tan compleja que sólo mediante un recorrido sistemático alrededor de ella, un ingeniero podrá abarcarla. ▪Porque nuestro deber profesional es lograr la seguridad, pero debemos cuidarnos de atajos que nos conduzcan a la falsa seguridad.

▪ The system the Bush administration wanted for Mexico was similar to its warrantless eavesdropping operation in the U.S. “The target phone database should be able to accommodate a maximum of 8,000,000 sessions,” it added, “programmable by telephone service provider and monitoring center operators.” The surveillance center would also have “the ability to generate a data bank for voices for the analysis of comparison, recognition and identification.” This would give the center the capability to scan millions of telephone calls using voice prints of their targets. Another innovation was the ability to bring under surveillance ever widening circles of people—not just the target, but whoever called the target and then whoever called that person, and so on. “The ability,” said the proposal, “to analyze calls (call crossovers) and the automatic generation of links between them.” (Bamford, 2008, pág. 227)

A

11.96%

Ñ

0.29%

B

0.92%

O

8.69%

C

2.92%

P

2.77%

D

6.87%

Q

1.53%

E

16.78%

R

4.94%

F

0.52%

S

7.88%

G

0.73%

T

3.31%

H

0.89%

U

4.80%

I

4.15%

V

0.39%

J

0.30%

W

0.01%

K

0.01%

X

0.06%

L

8.37%

Y

1.54%

M

2.12%

Z

0.15%

N

7.01%

▪ Anderson, R. (2008). Security Engineering. A Guide to Building Dependable Distributed Systems. Second Edition. Wiley. ▪ Bamford, J. (2002). Body of Secrets. Anatomy of the UltraSecret National Security Agency. New York:Anchor Books. ▪ Bamford, J. (2008). The Shadow Factory. The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. New York:Doubleday. ▪ CNSFAA. (2005). Network Sicence. Washington:National Academic Press. ▪ Genkin, D.; Shamir, A. y Tromer, E. (2014). RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. In: Garay J.A., Gennaro R. (eds). Advances in Cryptology – CRYPTO 2014. Lecture Notes in Computer Science, vol 8616. ▪ Gómez, J. (2012). Matemáticos, espías y piratas informáticos. Codificación y criptografía. España:RBA Coleccionables. ▪ Hornby, G.; Globus, A.; Linden, D.S. y Lohn, J. (2006). Automated Antenna Design with Evolutionary Algorithms. AIAA Space Forum 2006.

▪ Horowitz, D. (1972). U.S. Electronic Espionage: A memoir. Ramparts 11(2):35-50. Disponible en https://wikileaks.org/wiki/Perry_Fellwock, el 29 de Junio de 2014. ▪ Kahn, D. (1973). The codebreakers. The story of secret writing. Chicago:New American Library. ▪ NO1BC. (2017). Cryptographic strength. Disponible en: http://no1bc.com/support/articles/cryptographic-strength/, el 5 de Julio de 2017. ▪ Rui Li; Tao Wang; Zhigang Zhu; Wen Xiao (2011). "Vibration Characteristics of Various Surfaces Using an LDV for LongRange Voice Acquisition". IEEE Sensors Journal. 11 (6): 1415. doi:10.1109/JSEN.2010.2093125 ▪ Verton, D. (2004). Black Ice. La amenaza invisible del ciberterrorismo. Madrid:McGraw-Hill. ▪ Xiaodong, D.; Wagner, W. y Tian, X. (2001). Timing Analysis of Keystrokes and Timing Attacks on SSH. Proceedings of the 10th conference on USENIX Security Symposium.

Sergio Ellerbracke [email protected] @SerEllerbracke

Sergio Ellerbracke