
Average Reviews:

(More customer reviews)I was fascinated by the name of the book - especially, the subtitle "The end to hacking as we know it". I have been involved with the Internet since the 70's and wondered in what direction this book would take us. Richard does a great job of tackling difficult topics and bases everything on real world hands on experience. For example, Chapter 6 is devoted to Identity and gives you a broad view of different definitions and use of identity in such a way that it becomes clear that we need to build a future with many different forms of identity coming together within the Internet infrastructure. The chapter flows smoothly into the next chapter that introduces the history of hacking and works you through the many approaches that have impacted many of us. With that under your belt, the real fun begins as cyber-security takes on the role of changing the way we do business and networking. I would highly recommend this book for anyone interested in Internet related technology, how we got there and how we will get to the future without the hacking of today.
Click Here to see more reviews about: Beyond HIP: The End to Hacking As We Know It
The Internet is the result of the success of a simple protocol that was developed in the 1960s and1970s by a few researchers working to develop an indestructible communications protocol concept.The enormous growth of the concept has made the Internet the foundation of a revolution of technologyand culture that will form the next hundred years of life on the planet earth. There is evenconjecture by Vint Cerf, one of the founders of the Internet, that this will be the foundation of theinterplanetary network. The failings of this astounding revolution can be traced back to severalmisconceptions in the early days of development. One misconception was that the addressing andlocating schemes would primarily be applied to stationary and immobile computer systems. Anothermisconception is that the IP address could be used as both an address (locator) and an identityat the same time. Vint Cerf has stated; \'the additional header overhead did not seem necessary."Bob Moskowitz and the Internet Engineering Task Force (IETF) set out to resolve these failings byenvisioning a protocol that would separate the locator and the identity so the underlying vulnerabilityis addressed. The result was the Host Identity Protocol (HIP). The Host Identity Protocol bookhas been written by Andrei Gurtov and gives an excellent protocol specifi cation overview. ImplementingHIP, however, requires infrastructure and process to deliver the HIP protocol. The OpenGroup, a Fortune 500 standards defining group, developed an implementable architecture with theinfrastructure to deliver HIP security to mobile devices and platforms. The architecture was namedthe Secure Mobile Architecture (SMA) and includes HIP as one of the underlying architecturalcomponents. The architecture uses the following infrastructure components to deliver end-to-endsecurity for Intranets and the Internet:Host Identity Protocol (HIP)Public Key Infrastructure (PKI)Secure DatastoreLocationSMA was developed as an open standards, open source deployment architecture at The BoeingCompany, the aircraft manufacturer. The architecture and its components are in production on themoving production lines of The Boeing Company in Everett, Wa and is in development to be usedon aircraft world-wide for secure operational TCP/IP-based communications over the Internet.The architecture works for securing mobile industrial and operations requirements, as was proven bythe Boeing implementation. This book addresses the implications of SMA for the Internet at large;it can eliminate Internet hacking as we know it. Using HIP/SMA, the packets on the public Internetare secure and have cryptographic identities onboard the packets as they traverse the Internet. HIP/SMA protects against public Internet attacks such as Denial of Service (DoS), Man-In-The-Middle(MITM), spoofi ng, and phishing. HIP/SMA delivers the legal basis for establishing the Internet asthe secure premier identity-based personal, business, and government tool for the worldwide and interplanetary Internet.--This text refers to the Kindle Edition edition.
Click here for more information about Beyond HIP: The End to Hacking As We Know It
0 comments:
Post a Comment