End-user Computer Security/Preliminaries

End-user Computer Securitysim
Inexpensive security

for   

⊟ individuals
⊟ sole traders
⊟ small businesses



Meta information

edit
⬆ Up-vote section | Meta information ⬇ Down-vote section | Meta information



Table of Contents

edit
⬆ Up-vote section | Table of Contents ⬇ Down-vote section | Table of Contents


Main content
Chapter   3:Wireless Communications
Chapter   6:Mind-reading attacks
Chapter   9:What to do when you discover your computer has been hacked
Appendix
Part   2:Example set-ups & implementations



Index     (NOT FINISHED)

edit
⬆ Up-vote section | Index ⬇ Down-vote section | Index


2FA[see ╱2-factor authentication]
2-factor authentication (2FA) [see ╱multi-factor authentication╱2-factor authentication]
2nd hand [see ╱second hand]
33c3 [see ╱33rd Chaos Communication Congress]
33rd Chaos Communication Congress (33c3) [see ╱33rd Chaos Communication Congress]
3D (3D means three dimensional)
3D-optimised hardware [see ╱hardware╱3D-optimised hardware]

A
above-average security
minimally-above-average security (broad security principle) [see ╱broad security principles╱minimally-above-average security]
age of software, and devices
old
old mobile phone, mobile device (cf. §”Old or new phone”)
old version of software (cf. §”Vulnerability when used for software”)
new
new mobile phone
new software
average security [contrasts with ╱above-average security]
account security for your email account [see ╱electronic mail╱email account security]
acetone as a glue solvent [see ╱glue╱glue solvents╱acetone]
administrator account [see ╱operating system╱operating-system login account╱administrator account]
adversary [related to ╱computer security attack╱threat model]
intruder
spy
eavesdropper
evil maid
fraudster
security hacker
military
government
Man In The Middle
psychics
secret criminal society
affordable [see ╱costs╱affordable]
artificial intelligence (AI)
AI [see ╱artificial intelligence]
algorithms [see ╱programming╱algorithms]
alphabet [see ╱language╱alphabet]
Andrew "bunnie" Huang [see ╱persons (individuals named in book)]
Android (Android operating system for mobile devices) [see ╱operating system╱different operating systems]
alarm (security alarm)
motion detector alarm
loud alarm
amnesia and security in spite of it [see ╱security in spite of amnesia]
antivirus software
antivirus software on Android
app (type of software program)
Google Authenticator (key- and time- based app)
Haven: Keep Watch
Archimedes’ principle [see ╱physical properties╱volume]
asymmetric cryptography [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]
‘at rest’
‘at rest’ security location
‘at rest’ data
‘at rest’ shape retention (cf. §“Perhaps the simplest and best idea”)
attack (computer security attack)
different classes of attack
'complete fake' attacks
evil maid attack
hardware hacking attack [see ╱hack╱security hacking╱hardware hacking.]
health attack (eg. causing fatigue, concentration/memory loss, by use of directed non-lethal energy weapons)
man-in-the-middle (MITM) attack
mind-reading psychic attack
‘Inception’ styled attacks
replay attack
tampering attack
VDU signal interception attack
specific attacks
credential stuffing
malicious sneaky replacement of full-disk encryption system with historic clone of system that has known vulnerabilities
attack vectors
bootloader (of computer system)
computer screen
computer keyboard
device ROM malware
further writes to optical discs that are otherwise seemingly read-only
general visual spying
multi-booting (cf. §”Which OS?”) “...There is unlikely much point in dual-booting between Windows and Linux because if Windows is hacked,...” (cf. §”Qubes OS 4.0.3 side-by-side with other operating systems”) “...any such other OS should not be able to access or even ‘touch’ the Qubes OS installation, thereby hopefully safeguarding the Qubes installation from attacks conducted through the other presumably-less-secure OS.”
psychic spying
password reuse
random access memory (see §”Magnetic storage: tapes vs. discs”)
attack window (cf. §Using_most_secure_window_of_time) [see ╱window of time╱attack window]
(cf. §”Rewritable media vs optical ROM discs”]
attack surface
“destroy key when attacked” [see ╱keys╱digital key╱“destroy key when attacked”]
auditing source code [see ╱programming, coding, reprogramming╱source code╱auditing source code]
authentication
authentication keys [see ╱key╱digital key╱authentication key]
cross authentication of public-key-cryptography (aka asymmetric cryptography)
security certificates [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates╱cross authentication]
measuring physical properties for authentication
testing for security authentication [see ╱testing]
auto-power-off of laptop [see ╱powering computer systems╱automatic powering off of the laptop]
automatic powering off of the laptop [see ╱powering computer systems╱automatic powering off of the laptop]

B
backup, back-up (computer backup)
backing-up before factory reset
backing-up files (computer files)
after discovery of having been hacked
backing-up security keys and passwords [contrasts and can complement ╱key╱digital key╱destroying keys]
Shamir's Secret Sharing
bad blocks (on digital storage media) [see ╱digital storage╱media╱bad blocks]
balance-of-probabilities [see ╱probability╱balance-of-probabilities]
banking (financial banking) [see ╱financial╱banking]
bare bones [see ╱systems╱properties╱bare bones]
Basic Input Output System (BIOS used in computer boot sequences) [see ╱boot╱bootloader╱first-stage boot loader]
‘bells and whistles’ [see ╱systems╱properties╱‘bells and whistles’]
best practice (perhaps not complete)
for creating a read-only CD or DVD
for obtaining software
for backing-up files after being hacked
BIOS [see ╱Basic Input Output System]
Bitcoin [see ╱financial╱currency╱cryptocurrency╱different currencies╱Bitcoin]
blackbox [see ╱systems╱properties╱blackbox]
Bluetooth [see ╱communication╱wireless communication╱types╱Bluetooth]
boot (computer’s startup sequence)
bootable media
bootkits
bootloader
first-stage boot loader (such as in BIOS or UEFI)
not requiring second stage
Coreboot
Heads (built on top of Coreboot technology)
second-stage boot loader (no content at present)
cold, or warm booting (warm boot is also known as soft off/boot)
cold boot [see ╱powering computer systems╱system power states╱powered-off]
soft off/boot, warm boot [see ╱powering computer systems╱system power states╱soft off/boot, warm boot]
multi-booting
dual-booting
Boots photo printing (UK) [see ╱business╱online printing businesses]
braille [see ╱language╱braille]
brain-reading [see ╱mental╱mind reading╱brain reading]
broad security principles
“destroy key when attacked” [see ╱data destruction╱“destroy key when attacked”]
DIY security principle
geospatial-based broad security principles
measuring physical properties for authentication [see ╱authentication╱measuring physical properties for authentication]
minimally-above-average security
ordering many units of same product [see ╱order, ordering╱ordering many units of same product]
preventing lapses in security
publishing security methods
relying on high production cost of certain security tokens
report cyber-crime to the police [see ╱report, reporting╱report cyber-crime to the police]
stop funding the spies and hackers
think in terms of gradual movement along a security-level continuum
time-based broad security principles
“based on time passed” security principle
“based on time taken to forge” security principle
using most secure window of time
user randomly selecting unit from off physical shelves [see ╱business╱shop╱physical shop╱physical shelves]
browser for web/internet [see ╱web/internet browser]
building software [related to ╱programming]
build from source, compile from source
reproducible builds
detecting malware by using reproducible builds [see ╱malware╱detecting malware in source code╱by using reproducible-builds protocol]
compile
bubble wrap [see ╱shape flexibility╱bubble wrap]
budget (financial constraint) [see ╱costs╱financial constraints]
budget (cheap) [see ╱costs╱cheap]
burning, burn (writing CDs, DVDs, etc.) [see ╱hardware╱drives and readers╱optical disc drive╱optical disc writers╱writing optical discs╱optical disc writers╱writing optical discs]
burner phones [see ╱phones╱mobile phones╱burner phones]
business (intersects with manufacturer, producer)
business models (no content at present)
open-source vs. closed-source (no content at present)
company (business)
company registration number
company registered office
names of different businesses named in book
Boots
GitHub [see ╱systems╱collaborative development╱GitHub]
Google
Kodak
Nitrokey
Oracle [see ╱Oracle]
PC World
Sandisk
Tesco
Yubico
online printing businesses
Boots
Kodak
Tesco
shop
physical shop
physical shelves
user randomly selecting unit from off physical shelves (broad security principle)
online shop
second-hand shop
sole trader
small business
byte-for-byte comparison

C
camera [related to ╱photography]
camera phone
digital camera
card readers for SD cards [see ╱hardware╱digital-storage hardware╱drives and readers╱card readers for SD cards]
cardboard
cardboard [see ╱materials╱cardboard]
cardboard “restricted viewing enclosure” [see ╱view restriction╱cardboard “restricted viewing enclosure”]
compact disc [see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical╱CDs]
CD [see ╱compact disc]
certification authorities (for public-key-cryptography security certificates) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates╱certification authorities╱]
certificates for security based on public-key cryptography (aka asymmetric cryptography) [see ╱security certificate for public-key cryptography]
channels (purchase channels) [see ╱purchasing╱purchase channels]
changing passwords and keys
when to change
changing password to one previously used [see ╱password╱password reuse]
changing encryption keys frequently in FDE [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption╱frequent changing of encryption keys]
cheap [see ╱costs╱cheap]
China [see ╱countries mentioned in book╱China]
Chaos Communication Congress [see ╱organisations and businesses╱names of non-business organisations╱Chaos Communication Congress]
ChromeOS [see ╱operating system╱different operating systems]
Chromebook, Chromebox, Chromebit [see ╱personal computer╱different “ready-to-run” PCs marketed as products╱Chromebook, Chromebox, Chromebit]
Chrome web browser [see ╱web/internet browser]
Cipher [see ╱cryptography, cryptographic╱cipher]
client (in server-client computing model) [see ╱server-client computing model╱client]
cling film [see ╱materials╱transparent material╱cling film]
cloned physical key [see ╱key╱physical key╱cloned key]
closed/open source [see ╱open/closed source]
clouds [see ╱cloud computing╱clouds]
cloud computing [related to ╱server-client computing model] [related to ╱sandboxing]
clouds
Oracle Cloud [see ╱Oracle╱Oracle Cloud]
code (source code) [see ╱programming╱source code]
coding (programming) [see ╱programming]
cognitive power [see ╱mental╱cognitive power]
coin tossing [see ╱random╱generating randomness╱coin tossing]
collaborative development [see ╱systems╱collaborative development]
comparing files (computer files) [see ╱file╱file comparison]
'complete fake' attacks (computer security attack) [see ╱attack╱different classes of attack]
computer screen lock/locking (aka screensaver lock)
computer security attack [see ╱attack]
communication
communication protocol
zero-knowledge authentication protocol
communication protocols for computing devices
protocols that are also standards
for wireless communication
Bluetooth
NFC (Near-Field Communication)
WiFi
internet protocols
Hypertext Transfer Protocol Secure (HTTPS) [related to ╱Transport Layer Security]
Transport Layer Security should be added here?
communicating trust in “proofs of work” associated with cryptocurrencies
devices used for communication?
thin/fat clients?
mobile phone?
file transfer, file transmission, sending files [see ╱file╱file transfer, file transmission, sending files]
gazettes as a means for overcoming MITM attacks
interception of communication in MITM attacks
family of attacks (blocking comms, imposture, stealing/spying of confidential information)
Add language?
modes of message-based communication
electronic mail (email)
email account security (email account security)
cf. two-step security for Google account
importance of electronic-mail account security (cf. §“National Cyber Security Centre”)
email encryption [covered under ..╱email security]
email security (email security) [related to ..╱email account security]
PGP (Pretty Good Privacy) cryptography for email security (could perhaps do with more content here, cf. Main_content╱Broad_security_principle#Example_2)
encrypting emails (no content at present)
digitally signing emails (cf. Main_content/Broad_security_principles#Example_2)
PGP cryptography in general[see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Pretty Good Privacy cryptography]
software for communication
web/internet browser
text-message
OEM software as a means for communicating software to end-users?
over the internet?
add postal mail?
printing as part of communication process
secure communication
using encryption?
add public-key cryptography?
add cipher?
key scrambler?
of files (no content at present) (╱file╱file/file transfer, file transmission, sending files╱secure communication of files) (cf.Appendix invention).
of public keys? Non-compromised communication of public keys. (cf. Appendix invention).
of security certificates by pre-installing them on computing devices?
of passwords? (flavour-encoding, etc.) (cf. Appendix invention)
add website publishing here?
server-client model vs. peer-to-peer model, for communications
add I/O communication?
wireless/wired communication
wireless
types
WiFi
WiFi protocol [see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱WiFi]
WiFi network [see ..╱..╱..╱networks╱WiFi network]
WiFi router [see ╱hardware╱router╱WiFi router]
NFC (Near-Field Communication)
NFC protocol [see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱NFC]
Bluetooth
Bluetooth protocol [see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱NFC]
hardware
WiFi router [see ╱hardware╱router╱WiFi router]
networks
WiFi network
wired
types
USB
PS/2
serial/parallel port (no content at present)
ethernet
conscious thoughts [see ╱mental╱conscious thoughts]
company (business) [see ╱business, company]
compile [see ╱building software╱compile]
computer analysis
computer case
cookies
combination lock
combination lock briefcase
computer operating costs [see ╱costs╱operating costs╱computer operating costs]
computer peripheral
USB keyboards
Bluetooth devices
memory sticks
computer screws
computer security standards [see ╱cybersecurity standards]
concealment
Coreboot (BIOS/UEFI boot firmware system) [see ╱boot╱bootloader, first-stage boot loader]
coronavirus disease 2019
costs
affordable [related to ..╱cheap] (cf. UV tinting of already-owned glasses)
cheap (cf. low cost, cf. low price, cf. paper-based scrambler [which is cheap], cf Report cybercrime to the police) [because OEM software is often cheap means for obtaining software, related to ╱software╱OEM software] [because open source is often cheap, associated with ╱open/closed source╱open source]
expensive
relying on high production cost of certain security tokens (broad security principle)[see ╱broad security principles, relying on high production cost of certain security tokens]
financial constraints, budget [related to ..╱affordable] [see ╱financial, financial constraints]
operating costs
computer operating costs
stop funding the spies and hackers (broad security principle) [see ╱broad security principles╱stop funding the spies and hackers]
countries mentioned in book
China
United Kingdom
United States of America
Germany
Holland
Netherlands [see ..╱Holland]
COVID-19 [see ╱coronavirus disease]
cracking passwords [see ╱password cracking]
credential stuffing
crime reporting to the police, for cyber-crime [see ╱report, reporting╱report cyber-crime to the police]
cross authentication
cross authentication of digital security certificates [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates╱cross authentication]
crumpling plastic bag
cryptocurrencies/cryptocurrency [see ╱financial╱cryptocurrency]
cryptography, cryptographic
Algorithms [covered under ..╱protocols and algorithms]
cipher
cryptocurrencies/cryptocurrency [see ╱financial╱cryptocurrency]
disk encryption
full-disk encryption (FDE) [see ..╱full-system encryption, full-disk encryption]
encrypting emails using PGP security [covered under ..╱protocols and algorithms╱public-key cryptography╱Pretty Good Privacy cryptography╱PGP cryptography for email security]
encrypting a full system, a full disk [see ..╱full-system encryption, full-disk encryption]
encryption using passwords [see ╱password╱password encryption]
FDE [see ..╱full-system encryption, full-disk encryption]
full-system encryption, full-disk encryption (FDE)
frequent changing of encryption keys
password encryption [see ╱password╱password encryption]
protocols and algorithms
asymmetric cryptography (aka public-key cryptography) [see ..╱public-key cryptography╱]
public-key cryptography (aka asymmetric cryptography, using public-private key pair, digital cryptography)
cryptocurrencies/cryptocurrency [see ╱financial╱cryptocurrency╱public-key cryptography]
digital signing/signatures of files (no particular content at present)
public key
private key
private key
security by pre-loaded private key [see ╱systems╱design╱security by pre-loaded private key]
Pretty Good Privacy (PGP) cryptography
PGP cryptography for email security [see ╱electronic mail╱email security╱PGP cryptography for email security]
PGP public key
software
GNU Privacy Guard (GPG) [see ╱software tools, software utilities╱cryptography╱GPG]
Transport Layer Security (TLS) [related to ╱Hypertext Transfer Protocol Secure]
TLS security certificates
security certificates
certification authorities
cross authentication
security certificate
specific types
TLS security certificates [see ..╱..╱..╱Transport Layer Security╱TLS security certificates]
signing/signatures [see ..╱digital signing/signatures]
security certificates for public-key-cryptography (aka asymmetric-cryptography) authentication [see ..╱protocols and algorithms╱public-key cryptography╱security certificates]
security tokens for public-key cryptography [see ╱security tokens╱security tokens for public-key cryptography]
software
Google Authenticator (key- and time- based app) [see ╱app╱Google Authenticator]
cryptographic software tools, software utilities [see ╱software tools, software utilities╱cryptography]
system encryption
full-system encryption [see ..╱full-system encryption, full-disk encryption]
tokens for public-key cryptography [see ╱security tokens╱security tokens for public-key cryptography]
currency [see ╱financial╱currency]
cushioning, cushion
custom, customisation
custom BIOS/UEFI
cybersecurity standards [see ╱standards╱standards for security╱cybersecurity]

D
‘data at rest’ [see ╱‘at rest’ data]
data structures
data destruction [contrasts and can complement ╱backup╱]
“destroy key when attacked” [contrasts and can complement ╱backup╱backing-up security keys and passwords]
crypto shredding [contrasts and can complement ╱backup╱backing-up security keys and passwords]
data sanitisation
data erasure
physical destruction
data erasure
data sanitisation
deleting files [see ╱file╱file deletion]
design of systems [see ╱systems╱design]
“destroy key when attacked” (broad security principle) [see ╱broad security principles╱“destroy key when attacked”]
destructive measuring [see ╱measuring method types]
detecting malware in source code [see ╱malware╱detecting malware in source code]
deteriorate (cf. deterioration in factory resets)
deterioration due to frequent changing of encryption keys in FDE [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption╱frequent changing of encryption keys]
diamonds
imitation diamonds (see dedicated index entry)
dice (rolling dice) [see ╱random╱generating randomness╱rolling dice]
diffraction [see ╱optical effects]
diff [see ╱software tools, software utilities╱file comparison╱diff]
diffoscope [see ╱software tools, software utilities╱file comparison]
digital camera [see ╱camera╱digital camera]
digital certificates for security based on public-key cryptography (aka asymmetric cryptography) [see ╱security certificate for public-key cryptography]
digital signing/signatures [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱digital signing/signatures]
digital storage
media
bad blocks
microchip-based computer memory (hardware-based)
ROM (Read-only Memory) [see ╱memory╱ROM]
RAM (Random-access Memory) [see ╱memory ╱RAM]
flash memory [see ╱memory╱flash memory]
non-microchip-based memory (hardware-less)
all types, alphabetical listing
compact disc (CD) [see ..╱..╱Random-access Memory╱dis(c|k)-based╱optical/compact disc]
digital versatile disc (DVD) [see ..╱..╱Random-access Memory╱dis(c|k)-based╱optical╱digital versatile disc]
floppy disk [see ..╱..╱Random-access Memory╱dis(c|k)-based╱magnetic╱floppy disk]
hard disk drive (HDD) [see ..╱..╱Random-access Memory╱dis(c|k)-based╱magnetic╱hard disk drive]
holographic data storage [see ..╱..╱Random-access Memory╱holographic data storage]
magnetic-optical tape [see ..╱..╱Sequential-access Memory╱tape╱magnetic-optical]
magnetic-optical discs [see ..╱..╱Random-access Memory╱dis(c|k)-based╱magnetic-optical╱magnetic-optical discs]
magnetic tape (eg. cassette tapes) [see ..╱..╱Sequential-access Memory╱tape╱magnetic]
optical tape [see ..╱..╱Sequential-access Memory╱tape╱optical]
SAM [see ..╱Sequential-access Memory]
Sequential-access Memory (SAM)
tape
optical
magnetic
magnetic-optical
drives for such media [see ╱hardware╱digital-storage hardware╱drives and readers╱tape drives]
RAM[see ..╱Random-access Memory]
Random-access Memory (RAM)
dis(c|k)-based
optical
optical ROM (read-only memory) discs [read-only CDs, read-only DVDs, etc.]
writing (aka burning) optical ROM discs
as live DVDs, or live CDs
burner for such media [see ..╱writer for such media]
compact disc (CD)
digital versatile disc (DVD)
drive for such media [see ╱hardware╱digital-storage hardware╱drives and readers╱optical disc drives]
writer (burner) for such media [covered under ..╱‘drive for such media’]
magnetic
floppy disk
drive for floppy disks [see ╱hardware╱digital-storage hardware╱drives and readers╱floppy disk drive]
hard disk drive (HDD)
magnetic-optical
magnetic-optical discs
holographic data storage (no information at present)
hardware [see ╱hardware╱digital-storage hardware]
disk encryption
full-disk encryption (FDE) [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]
DIY [see ╱Do It Yourself]
downloads, downloading
Do It Yourself (DIY)
DIY ultrasound imaging kit [see ╱physical properties╱images]
DIY security principle (broad security principle) [see ╱broad security principles╱DIY security principle]
drives (computer drive) and readers (card readers for computer systems) [see ╱hardware╱digital-storage hardware╱drives and readers╱]
dual-booting (a special instance of multi-booting) [see ╱boot╱multi-booting]
Digital Video Disc [see ╱Digital Versatile Disc]
Digital Versatile Disc [see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical╱DVDs]
DVD [see ╱Digital Versatile Disc]

E
eavesdropper, eavesdropping [see ╱spy╱eavesdropper]
Eiffel (Eiffel programming language) [see ╱programming╱programming languages╱Eiffel]
electronic keyboard signals
electric fields
electric field imaging [see ╱physical properties╱image]
electronic mail [see ╱communication╱electronic mail]
electromagnetic
electromagnetic radiation
electromagnetic spectrum
email [see ╱communication╱electronic mail]
EM radiation [see ╱electromagnetic radiation]
embedded
embedded microcontrollers
emoji [see ╱language╱emoji]
emulators (type of software that emulates another software)
Wine Is Not an Emulator (Wine) (Windows emulator for Unix-like operating systems)
engineering
encryption [covered under ╱cryptography, cryptographic╱]
epoxy resin
espionage [see ╱spy]
ethernet
error correction
error correction algorithms
Essex police [see ╱police]
evil maid attack [see ╱attack╱different classes of attack]
Expensive [see ╱costs╱expensive]

F
factory resets
fail safe
fantasy (fiction)
fat clients [see ╱server-client computing model╱client╱thin/fat clients╱fat clients]
FDE (full-disk encryption, full-system encryption) [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]
file (computer file) [related to ╱digital storage]
backing up files [see ╱backup╱backing up files]
digital-signing of files, and the use of such signatures [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱digital signing/signatures╱of files]
file comparison
to detect malware introductions when using reproducible-builds protocol
byte-for-byte comparison [see ╱byte-for-byte comparison for general treatment of byte-for-byte comparison]
software tools and utilities [see ╱software tools, software utilities╱file comparison]
file deletion (no particular content at present)
recoverable deletion (no particular content at present)
data sanitisation [falls under ╱data destruction╱data sanitisation]
file transfer, file transmission, sending files
downloads, downloading (no particular content at present) [falls under ╱downloads, downloading]
secure communication of files [see ╱secure communication╱of files]
malware in files (no particular content at present) [see ╱malware╱malware in files]
forge, forgery
“based on time taken to forge” broad security principle [see ╱broad security principles╱time-based broad security principles╱“based on time taken to forge” security principle]
financial [related to ╱costs]
banking
bank references (transaction references)
bank transactions [see ╱financial╱financial transactions╱bank transactions]
bank systems [see ╱financial╱financial systems╱bank systems]
bank transfer
bank branch
currency
weak currency
money
monetary amounts
cryptocurrency
authentication coins
different currencies
Bitcoin
Bitcoin keys [see ..╱..╱..╱cryptocurrency keys╱Bitcoin keys]
cryptocurrency keys
Bitcoin keys
cryptocurrency security [see ╱standards╱security standards╱cryptocurrency]
cryptocurrency systems [see ╱financial╱financial systems╱cryptocurrency systems]
cryptocurrency transactions [see ╱financial╱financial transactions╱cryptocurrency transactions]
mining cryptocurrency
proof of work
public-key cryptography (using public-private key pair, aka asymmetric cryptography)
public-key cryptography in general [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]
financial constraints, budget [see ╱costs╱financial constraints╱budget]
financial systems
bank systems
cryptocurrency systems (no particular information at present)
financial transactions
bank transactions
cryptocurrency (such as Bitcoin) transactions
refund
security in finance
cryptocurrency security [see ╱standards╱security standards╱cryptocurrency]
using bank branches
treasure map [see ╱treasure map]
fingerprint
firmware
flash/flashing
flash cells
flash memory [see ╱memory╱flash memory]
flavours
floppy disk [see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱magnetic╱floppy disk]
foam
foam peanuts
foil
reflective foil
form factor
fraud
full-system encryption, full-disk encryption (FDE) [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]

G
gazette
Gas Chromatography Mass Spectrometry machine
GC-MS machine [see ╱Gas Chromatography Mass Spectrometry]
GDPR [see ╱General Data Protection Regulation]
General Data Protection Regulation [see ╱legislation╱GDPR]
geographic areas [see ╱geospatial]
geospatial
geographic areas, geographies
see countries mentioned in book
geospatial-based broad security principles [see ╱broad security principles╱geospatial-based broad security principles]
Germany [see ╱countries mentioned in book╱Germany]
GitHub [see ╱systems╱collaborative development╱GitHub]
Glacier protocol [see ╱standards╱security standards]
glare [see ╱optical effects]
glasses (looking glasses, spectacles)
glitter nail varnish
glue
glue solvents
acetone
super glue
Google
Google Authenticator (key- and time- based app) [see ╱apps]
government
GNU’s-Not-Unix! Privacy Guard (GPG) [see ╱software tools, software utilities╱cryptography╱GPG]
GNU Privacy Guard (GPG) [see ╱software tools, software utilities╱cryptography╱GPG]
GPG [see ╱software tools, software utilities╱cryptography╱GPG]
Greek alphabet [see ╱language╱alphabet╱non-latin alphabet╱Greek alphabet]
graphical user interface (GUI) (for computing)
gravitational weight [see ╱physical properties╱weight]
GUI [see ╱graphical user interface]

H
hack
hacker culture
security hacking
backing up files after discovery of having been hacked [see ╱backup╱backing up files╱after discovery of having been hacked]
hardware hacking
deep hardware hacking
mindset of hackers
stop funding the spies and hackers (broad security principle) [see ╱broad security principles╱stop funding the spies and hackers]
hand-made paper [see ╱natural hand-made paper]
hardware (computer hardware)
digital-storage hardware
drives (computer drive) and readers (card readers for computer systems)
card readers for SD cards [see ╱memory [microchip-based computer memory]╱flash memory╱Secure Digital cards╱readers]
floppy disk drive
optical disc drives
writer (aka burner)
writing (aka burning) optical discs
writing (aka burning) optical ROM discs (can be DVDs, CDs)[see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical╱optical ROM discs╱writing optical ROM discs]
tape drives
in relation to media
hardware-less media (for digital storage) [see ╱digital storage╱media╱non-microchip-based memory]
hardware-based media (for digital storage) [see ╱digital storage╱media╱non-microchip-based memory]
hardware hacking [see ╱hack╱security hacking╱hardware hacking]
hardware considered as either open-source or closed-source
open-source hardware [opposite of ..╱closed-source hardware]
Novena open-source computing hardware platform
(cf. USB device firmware specifications being more open)
closed-source hardware [opposite of ..╱open-source hardware]
(cf. SD card firmware not having open specifications?)
open/closed source in general [see ╱open/closed source]
processor
processor idle time
processor-hour work
router
WiFi router
trustable hardware
hardware optimisation
3D-optimised hardware
hardware researchers/specialists
Andrew Bunnie Huang
Trammel Hudson
hard disk drive [see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱magnetic╱hard disk drive]
Haven: Keep Watch [see ╱apps]
HDD [see ╱hard disk drive]
Heads (BIOS/UEFI boot firmware system) [see ╱boot╱bootloader╱first-stage boot loader]
hibernate (a computer’s hibernate mode) [see ╱powering computer systems╱system power states╱hibernate]
higher-level programming language [see ╱programming╱programming languages╱higher-level programming language]
high-risk, high-sensitivity
historic version of the software [see ╱old software, old devices]
historic software (historic version of the software) [see ╱historic version of the software]
hoax
deceptive fake (cf. forgery) (cf. evil maid attack where computer is replaced with deceptive fake) cf. “A counter-argument to using this protocol is that adversaries with supercomputers can easily fake such numbers of coins
..“
Holland [see ╱countries mentioned in book╱Holland]
hologram, holography, holographic
holographic data storage [see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱holographic data storage]
home and mobile working [related to ╱remote working]
home made
hotel
HTTPS [see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱ Hypertext Transfer Protocol Secure╱]
Hypertext Transfer Protocol Secure [see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱Hypertext Transfer Protocol Secure╱]

I
image
magnetic image [see ╱physical properties╱image]
magnetic resonance imaging [see ╱physical properties╱magnetic resonance imaging]
visual image [see ╱physical properties╱image]
radio-frequency imaging [see ╱physical properties╱image]
RF imaging [see ╱physical properties╱image]
electric field imaging [see ╱physical properties╱image]
photography [see ╱photography]
T ray [see ╱physical properties╱image╱t ray]
X ray [see ╱physical properties╱image╱x ray]
ultrasound image [see ╱physical properties╱image╱ultrasound image]
imitation diamonds
‘Inception’ (the film)
‘Inception’ styled attacks [see ╱attack╱different classes of attack╱mind-reading psychic attack╱‘Inception’ styled attacks]
deep hardware hacking [see ╱hack╱security hacking╱hardware hacking╱deep hardware hacking]
industrial radiography
infra-red scanning [see ╱physical properties]
infrared filter [see ╱physical properties]
ink
ink paper marbling [see ╱paper╱ink paper marbling]
input/output (input and output aspect of computing hardware)
I/O [see ╱Input/Output]
infra red [see ╱physical properties╱ infra red]
installation media
installation software [see ╱software╱installation software]
intellectual property
intellectual property concerning source code and designs
open source [opposite of ..╱closed source]
open source in general [see ╱open/closed source╱open source]
closed source [opposite of ..╱open source]
closed source in general [see ╱open/closed source╱closed source]
internal Read-Only Memory (of a computer system)
internal ROM [see ╱internal Read-Only Memory]
internet
internet research (cf. internet searching)
internet bandwidth, internet quota
internet browser [see ╱web/internet browser]
inventions for security [see ╱security invention]
isolation
physical isolation
software isolation

K
keyboard (computer keyboard)
keyboard privacy
key
digital key
asymmetric cryptography [aka public-key cryptography] [see ..╱public-key cryptography╱]
authentication key
backing-up security keys [covered under ╱backup╱backing-up security keys and passwords]
destroying keys [contrasts and can complement ╱backup╱backing-up security keys and passwords]
crypto shredding [see ╱data destruction╱crypto shredding]
“destroy key when attacked” [see ╱data destruction╱“destroy key when attacked”]
frequent changing of encryption keys in FDE [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption╱frequent changing of encryption keys]
public-key cryptography (using public-private key pair, aka asymmetric cryptography)
PGP (Pretty Good Privacy) public key [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱PGP public key]
private key [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱private key]
public key [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱public key]
Bitcoin keys [see ╱financial╱currency╱cryptocurrency╱different currencies╱Bitcoin╱Bitcoin keys]
tokens for public-key-cryptography keys [see ╱security tokens╱security tokens for public-key cryptography]
physical key [related to ╱physically lock, physical lock╱physical -key lock]
cloned key [see ╱cloned key]
key loggers
key scrambler (aka keyboard scrambler)
key servers
keystrokes
keyboard (for computer)
Kodak online printing (UK business) [see ╱business╱online printing businesses]
Kosagi (Team Kosagi)

L
language
alphabet
Latin alphabet
non-Latin alphabet
Greek alphabet
unicode
non-verbal symbol
word symbol
braille
emoji
Morse code
programming language [see ╱programming╱programming language]
pronunciation
unicode
lapse(s) in security [see ╱security lapse]
laptop
Latin alphabet [see ╱language╱alphabet]
legislation (hardly any content at present)
GDPR (General Data Protection Regulation)
lenticular printing
library
light rays
Linux (OS) [see ╱operating system╱different operating systems]
live DVD, live CD
location (geospatial) [see ╱geospatial]
lock (physical) [see ╱physical lock]
locking, and lock for, computer screen [see ╱computer screen lock/locking]
login, log-in, log-off
log-off (no particular content at present?)
loud alarm [see ╱alarm╱loud alarm]
low cost [see ╱costs╱cheap]

M
magnetic fields, magnetism, magnet, magnetic
magnetic tape (computer storage, eg. cassette tapes) [see ╱digital storage╱non-microchip-based memory╱Sequential-access Memory╱tape╱magnetic]
magnetic-optical [see ╱magnetic-optical]
magnetic weight [see ╱physical properties╱weight]
magnetic image [see ╱physical properties╱image]
magnetic resonance imaging [see ╱physical properties╱magnetic resonance imaging]
MRI [see ╱physical properties╱magnetic resonance imaging]
magnetic-optical
computer storage media
tape [see ╱digital storage╱non-microchip-based memory╱Sequential-access Memory╱tape╱magnetic-optical]
discs [see ╱digital storage╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱magnetic╱magnetic-optical discs]
magnetic tape (computer storage, eg. cassette tapes) [see ╱digital storage╱non-microchip-based memory╱sequential-access Memory╱tape╱magnetic]
malware
malware in files (no particular content at present)
detecting malware in source code
by using reproducible-builds protocol
in general
file-comparison aspect [see ╱file╱file comparison╱to detect malware introductions when using reproducible-builds protocol]
manufacturer, producer (intersects with business) (manufacturers and producers named in book)
OEM [see ╱original equipment manufacturer]
cf. provider’s authentication server in §“Security by pre-loaded private key”
<different manufacturer names>
Sandisk
Qubes
marbling (paper marbling) [see ╱paper╱paper marbling]
Mark Fernandes [see ╱persons]
mass storage
materials
acetone [see ..╱glue solvents╱acetone]
bubble wrap [see ..╱unrepeatable-pattern materials╱shape-retentive materials that are very easily deformed╱bubble wrap]
cardboard
cling film [see ..╱transparent material╱cling film]
crumpling plastic material [see ..╱shape-retentive material that is very easily deformed╱plastic that crumples]
foam peanuts [see ..╱unrepeatable-pattern materials╱polystyrene pieces╱foam peanuts]
foil (reflective foil) that is shredded [see ..╱unrepeatable-pattern materials╱shredded╱shredded reflective foil]
glitter nail varnish [see ..╱unrepeatable-pattern materials╱glitter nail varnish]
glue
super glue
glue solvent
acetone
hand-made paper [see ..╱paper╱hand-made paper]
holographic material that is shredded [see ..╱unrepeatable-pattern materials╱shredded╱shredded holographic material]
imitation diamonds [see ..╱transparent material╱imitation diamonds]
ink
ink
ink-marbled paper [see ..╱paper╱ink-marbled paper]
mylar x-ray film [see ..╱x-ray film╱mylar x-ray film]
newspaper [see ..╱paper╱newspaper]
paint
paper
hand-made paper
ink marbled-paper
newspaper
printer paper
tea-bag marbled stained paper
shredded paper
plastic, transparent pouch/bag material [see ..╱transparent material╱plastic pouch/bag material]
plastic that crumples [see ..╱unrepeatable-pattern materials╱shape-retentive material that is very easily deformed╱plastic that crumples]
polystyrene pieces [see ..╱unrepeatable-pattern materials╱polystyrene pieces]
printer paper [see ..╱paper╱printer paper]
reflective foil that is shredded [see ..╱unrepeatable-pattern materials╱shredded╱shredded reflective foil]
rice grains [see ..╱unrepeatable-pattern materials╱rice grains]
security tape
sellotape
shredded [see ..╱unrepeatable-pattern materials╱shredded]
shell-suit material [see ..╱unrepeatable-pattern materials╱shape-retentive material that is very easily deformed╱shell-suit material]
silk [see ..╱unrepeatable-pattern materials╱shape-retentive material that is very easily deformed╱silk]
super glue [see ..╱glue╱super glue]
tea-bag marbled stained paper [see ..╱paper╱tea-bag marbled stained paper]
tie-dye material [see ..╱unrepeatable-pattern materials╱materials that might be suitable╱tie-dye material]
transparent material
cling film [related to ..╱..╱unrepeatable-pattern materials╱shredded╱shredded cling film]
imitation diamonds [related to ..╱..╱unrepeatable-pattern materials╱imitation diamonds]
plastic pouch/bag material
transparent beads [related to ..╱..╱unrepeatable-pattern materials╱transparent beads]
transparent plastic that is shredded [related to ..╱..╱unrepeatable-pattern materials╱shredded╱shredded transparent plastic]
unrepeatable-pattern materials
glitter nail varnish
imitation diamonds
materials that might be suitable
paper
ink-marbled paper [see ..╱..╱..╱paper╱ink-marbled paper]
newspaper [see ..╱..╱..╱paper╱newspaper]
printer paper [see ..╱..╱..╱paper╱printer paper]
tea-bag marbled stained paper [see ..╱..╱..╱paper╱tea-bag marbled stained paper]
tie-dye material [see ..╱..╱..╱paper╱tie-dye material]
polystyrene pieces
foam peanuts
rice grains
shape-retentive materials that are very easily deformed
bubble wrap
plastic that crumples
shell-suit material
silk
shredded
shredded cling film
shredded holographic material
shredded optical discs
shredded paper[see ..╱..╱..╱paper╱shredded paper]
shredded transparent plastic
shredded reflective foil
transparent beads
x-ray film
mylar x-ray film
water
materially written
Matthew Garrett [see ╱persons]
measurements, readings of physical properties [see ╱physical properties╱readings╱measuring]
measuring method types
invasion related
invasive
non-invasive
destruction related
destructive
non-destructive
memorisation, memorise
memory (microchip-based computer memory)
ROM [see ╱Read-only Memory]
RAM [see ╱Random-access Memory]
flash memory
NOR flash (NOR stands for the not-or logic gate)
NAND flash (NAND stands for the not-and logic gate)
SD cards [see ╱Secure Digital cards also in this group]
Secure Digital cards (SD cards)
types
form factors
original
mini
micro
smartphone internal SD cards
readers for SD cards [see ╱hardware╱digital-storage hardware╱drives and readers╱card readers for SD cards]
SSD [see ╱solid-state drive]
mental
cognitive power
visual cognitive power
conscious thoughts
mental process
mindset of hackers [see ╱hack╱security hacking╱mindset of hackers]
mind reading
brain-reading
psychic
psychic attack [see ╱attack╱different classes of attack╱ mind-reading psychic attack]
psychic powers
security in spite of amnesia [see ╱security in spite of amnesia]
thinking outside the box
message digest
MFA [see ╱multi-factor authentication]
microwave oven [see ╱microwave testing]
military
military policy
scorched earth
other policies (no content at present)
mindset of hackers [see ╱hack╱security hacking╱mindset of hackers]
minimally-above-average security (broad security principle) [see ╱broad security principles╱minimally-above-average security]
multi-factor authentication (MFA)
2-factor authentication (special instance of MFA)
Micah Lee (a long-time Qubes advocate)
microchip (computer microchip, chip is abbreviation)
microchip-based computer memory [see ╱memory [microchip-based computer memory]]
microcontroller
Micro SD cards [see ╱Secure Digital cards]
mind reading [see ╱mental╱mind reading]
miracle, miraculous
Man In The Middle
memory stick [see ╱USB memory stick]
metal
metal boxes
Michael A. Caloyannides [see ╱persons]
microphone
MITM [see ╱Man In The Middle]
mobile devices
mobile phone [see ╱phones╱mobile phones]
mobile working [see ╱home and mobile working]
monetary amounts [see ╱financial╱currency╱money╱monetary amounts]
Morse code [see ╱language╱Morse code]
motherboard
motherboard ROM
motion detector alarms [see ╱alarms╱motion detector alarms]
MrChromebox
multi-step security [see ╱MFA]
multi-booting [see ╱boot╱multi-booting]
mylar x-ray film [see ╱physical properties]

N
naked eye [related to ╱visible spectrum]
National Cyber Security Centre for the UK (NCSC) [see ╱organisations and businesses╱names of non-business organisations╱National Cyber Security Centre]
natural hand-made paper
NCSC [see ╱organisations and businesses╱names of non-business organisations╱National Cyber Security Centre]
Neo public-key-cryptography USB security tokens [see ╱security tokens╱security tokens for public-key cryptography╱USB tokens╱brands╱Yubikey, Yubico╱Neo]
Near Field Communications (NFC) [see ╱communication╱wireless communication╱types╱NFC]
new software, and devices [see ╱age of software, and devices╱new]
Netherlands [see ╱countries mentioned in book╱Netherlands]
network for wireless communication [see ╱communication╱wireless communication╱network]
newspaper [see ╱paper╱newspaper]
NFC [see ╱communication╱wireless communication╱types╱NFC]
Nitrokey brand of USB security tokens [see ╱security tokens╱security tokens for public-key cryptography╱USB tokens╱brands╱Nitrokey]
noise (random noise) [related to ╱unrepeatable pattern]
visual noise
audio noise
white noise audio
non-Latin alphabet [see ╱language╱alphabet]
non-verbal symbol [see ╱language╱non-verbal symbol]
NOR flash (flash microchip memory) [see ╱memory [microchip-based computer memory]╱flash memory]
NAND flash (flash microchip memory) [see ╱memory [microchip-based computer memory]╱flash memory]
non-invasive measuring methods [see ╱measuring method types╱non-invasive]
non-destructive measuring methods [see ╱measuring method types╱non-destructive]
Novena open-source computing hardware platform [see ╱hardware╱hardware considered as either open-source or closed-source╱open-source hardware╱Novena open-source computing hardware platform]

O
obtaining software [see ╱software╱obtaining software╱]
occlusion
original equipment manufacturer (OEM) software [see ╱software╱OEM software]
OEM software [see ╱software╱OEM software]
old software, and devices [see ╱age of software, and devices╱old]
online printing business [see ╱business╱online printing business]
online shop [see ╱business╱shop╱online shop]
open/closed source
considered as a business model [see ╱business╱business models╱open-source vs. closed-source]
open source [opposite of ..╱closed source]
open source source code [see ╱programming╱source code╱source code considered as either open source or closed source╱open source source code]
open source hardware [see ╱hardware╱hardware considered as either open-source or closed-source╱open-source hardware]
open source considered as intellectual property [see ╱intellectual property╱intellectual property concerning source code and designs╱open source]
closed source [opposite of ..╱open source]
closed source source code [see ╱programming╱source code╱source code considered as either open source or closed source╱closed source source code]
closed source hardware [see ╱hardware╱hardware considered as either open-source or closed-source╱closed-source hardware]
closed source considered as intellectual property [see ╱intellectual property╱intellectual property concerning source code and designs╱closed source]
optical disc (such as CDs and DVDs) [see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱optical╱dis(c|k)-based]
optical ROM discs (read-only CDs, read-only DVDs, etc. {ROM=read-only memory}) [see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱optical╱optical ROM discs]
optical effects
transparency
translucency (no content at present).
reflectivity (cf. glare)
refractivity
diffraction [related to interference patterns in ╱hologram, holography..]
stereoscopy (no content at present).
polarisation
moving images revealed in holograms by moving hologram.
optical tape [see ╱digital storage╱media╱non-microchip-based memory╱Sequential-access Memory╱tape╱optical]
option ROMs (ROM=read-only memory)
Oracle
Oracle Cloud
Oracle Cloud compute instance
Oracle Cloud Linux [see ╱operating system╱different operating systems]
Oracle Cloud Linux compute instance
organisations and businesses
business [see ╱business]
names of non-business organisations
Chaos Communication Congress
Essex police [see ..╱governmental╱police╱Essex police]
National Cyber Security Centre (NCSC) [see ..╱governmental╱country-specific╱UK╱National Cyber Security Centre]
Qubes OS project (for general info about Qubes OS) [see ╱Qubes OS]
Raspberry Pi Foundation (for general info about Raspberry Pi technology) [see ╱Raspberry Pi]
Wikimedia Foundation (for general info about Wikipedia, which is owner by the foundation) [see ╱Wikipedia]
governmental
country-specific
UK
National Cyber Security Centre (NCSC)
Essex police
USA government
China’s government
military
police
police in general
Essex police [see ..╱..╱country-specific╱UK╱Essex police]
names of organisations and businesses
Boots
certification authorities
Chaos Communication Congress
China government
Essex police
GitHub [see ╱systems╱collaborative development╱GitHub]
Google
government
Kodak
National Cyber Security Centre (NCSC)
Nitrokey
Oracle
PC World
police
Qubes OS project
Raspberry Pi Foundation
Sandisk
secret criminal societies
Tesco
USA government
Wikimedia Foundation
Yubico
operating system (OS) (base platform software for using a computer)
different operating systems
Windows
Linux or Linux-based
Oracle Cloud Linux
Qubes OS
Raspberry Pi OS
Raspberry Pi OS
general info about Raspberry Pi technology [see ╱Raspberry Pi]
ChromeOS
Android operating system (for mobile devices)
operating-system login account
Administrator account
operating costs [see ╱costs╱operating costs]
order, ordering (request for product/service) [related to ╱purchasing]
compared with non-order acquisition of goods (ordering is prone to MITM attacks)
ordering many units of same product (broad security principle)
ordering goods requiring physical transit to customer
security for goods in physical transit [see ╱physical transit╱security for goods in physical transit]
returning orders [see ╱product return]
OS (operating system) [see ╱operating system]
outside the box [see ╱mental╱thinking outside the box]

P
padlock
padlockable laptop bag
painting, paint
paper?
paper shredders
paper marbling
ink paper marbling
tea-bag marbled stained paper
hand-made paper [see ╱natural hand-made paper]
paper tears
printer paper
recycled paper
newspaper
password
changing passwords [covered under ╱changing passwords and keys]
strong password
password encryption
password encoding
password reuse
password blacklisting
password capture
password manager (aka password vault)
password cracking
communicating passwords (cf. Appendix)
rate limiting in password attempts
pattern (graphical pattern)
personal computer (PC)
different “ready-to-run” PCs marketed as products
Chromebook, Chromebox, Chromebit [see ╱server-client computing model╱client╱web client computers╱Chromebook, Chromebox, Chromebit]
persons (individuals named in book)
Andrew "bunnie" Huang (computer hardware researcher and specialist)
Mark Fernandes (software developer, original author of this book)
Matthew Garrett (technologist, software developer, worked on secure boot protocol)
Michael A. Caloyannides (author of “Desktop Witness: The Do's and Don'ts of Personal Computer Security”)
Trammell Hudson (principal developer of the Heads BIOS/UEFI boot firmware system)
PC [see ╱personal computer]
PC World
peer review
Cf. Raspberry Pi, cf. peer review in ‘build from source’ section, cf. publishing security methods section (in broad principles section)
pencil
peripheral (computer peripheral)
phones
mobile phones
age of phone
old mobile phone [see ╱age of software, and devices╱old╱old mobile phone, mobile device]
new mobile phone [see ╱age of software, and devices╱new╱new mobile phone╱mobile device]
burner phones
smartphones
internal SD cards in smartphones [see ╱memory [microchip-based computer memory]╱flash memory╱SD cards╱smartphone internal SD cards]
PGP public key [see ╱cryptography, cryptographic╱protocols and algorithms╱Pretty Good Privacy cryptography╱PGP public key]
PGP cryptography [see ╱cryptography, cryptographic╱protocols and algorithms╱Pretty Good Privacy cryptography]
phish
photography, photograph, photographing
visible-spectrum photography
camera [see ╱camera]
photo printing
security-photo matching software [see ╱software╱security-photo matching software]
physical disturbance
physical isolation (cf. §“Based on time passed”)
physical key [see ╱key╱physical key]
physically lock, physical lock [related to ╱safe]
combination lock
padlock
physical -key lock [related to ╱key╱physical key]
physical properties
weight
gravitational weight
magnetic weight
weighing scales
images
visual images
magnetic images
magnetic resonance imaging
RF imaging [see below, radio-frequency imaging]
radio-frequency imaging
electric field imaging
photography [see ╱photography]
T ray (Terahertz radiation scan analogous to an x ray)
ultrasound images
DIY ultrasound imaging kit
ultrasonic sensor
X ray
mylar x-ray film
readings, measuring
measuring physical properties for authentication [see ╱authentication╱measuring physical properties for authentication]
ultrasound
volume (space in 3D)
Archimedes’ principle
X ray
industrial radiography
infra red
infrared scanning
infrared filter
microwave testing
microwave oven
radio-frequency detection
radio-frequency field
sound
ultrasound
physical shelves [see ╱business╱shop╱physical shop╱physical shelves]
physical shop/store [see ╱business╱shop╱physical shop]
physical transit
security for goods in physical transit
politics, political
piggy-back
pinhole (pinhole material)
pinhole glasses
pins (motherboard pins)
pixel, pix-elated
plastic
plastic bags [see ╱shape flexibility╱plastic bag]
platform (computer platform)
polarisation [see ╱optical effects]
police
Essex police [see ╱organisations and businesses╱names of non-business organisations╱Essex police]
report cyber-crime to the police [see ╱report, reporting╱report cyber-crime to the police]
polarised (polarised optical filter)
polystyrene pieces (such as those used for cushioning parcelled items) [see ╱foam peanuts]
porting source code to higher-level programming language [see ╱programming╱source code╱porting source code to higher-level programming language]
post (mail)
power states (system power states) [see ╱powering computer systems╱system power states]
powering computer systems
auto-power-off
system power states (for computer system)
working (s0)
sleep mode (s1, s2, s3)
hibernate (s4) (no content at present)
soft off/boot, warm boot (s5) (no content at present)
powered-off (step in cold booting) (G3) (cf. securing bootloader when in powered-off...)(there are two types of shutdown {G3}: graceful and hard)
Pretty Good Privacy (PGP) cryptography [see ╱cryptography, cryptographic╱protocols and algorithms╱Pretty Good Privacy cryptography]
principles of security that are broad [see ╱broad security principles]
printed, printing, print
on paper
3D printers (3D=three-dimensional, no content at present).
lenticular printing
printer paper [see ╱paper╱printer paper]
privacy screen filters[see ╱privacy screens [filters]]
privacy screens
privacy screen filters
privacy keyboard screen
programming, coding, reprogramming [related to ╱hack╱hacker culture]
secure coding
porting source code to higher-level programming language[see ..╱..╱source code╱porting source code to higher-level programming language]
programming languages
Eiffel
higher-level programming language
porting source code to higher-level programming language[see ..╱..╱..╱source code╱porting source code to higher-level programming language]
algorithms
denoising algorithms
cryptography algorithms [see ╱cryptography, cryptographic╱algorithms]
source code
auditing source code
by using collaborative development [see ╱systems╱collaborative development╱when used for auditing source code changes]
detecting malware in source code [see ╱malware╱detecting malware in source code]
porting source code to higher-level programming language
building from source [see ╱building software╱building from source]
source code considered as either open source or closed source
open source source code [opposite of ..╱closed source/source code]
closed source source code [opposite of ..╱open source source code]
open/closed source in general [see ╱open/closed source]
probability, probabilistic [related to ╱random]
balance-of-probabilities
product return
product ordering [see ╱order, ordering]
proof of work [see ╱financial╱cryptocurrencies╱proof of work]
pronunciation [see ╱language╱pronunciation]
pros vs cons (for and against)
protocols
for cryptography [see ╱cryptography, cryptographic╱protocols and algorithms]
for communication [see ╱communication╱communication protocols for computing devices]
that are also standards [see ╱standards╱protocols]
reproducible-builds protocol [see ╱building software╱reproducible builds]
zero-knowledge authentication protocol
provider
psychic [see ╱mental╱mind reading╱psychic]
PS/2 (keyboard interface standard, PS/2 means IBM Personal System/2, IBM stands for International Business Machines and is a technology company)
public authentication PGP key [see ╱key╱digital key╱public-key cryptography╱PGP public key]
public domain
private key [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱private key]
“private-public key pair” encryption [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]
public key [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱public key]
public-key cryptography (aka asymmetric cryptography) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]
“public-private key pair” encryption [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]
public places
publish, publishing
publishing security methods (broad security principle) [see ╱broad security principles╱publishing security methods]
purchase, purchasing [related to ╱ordering]
costs of purchases [see ╱costs]
purchasing channels
purchasing software [intersects with ╱software╱obtaining software╱]
refunds for purchases [see ╱financial╱refund]
returning purchased products [see ╱product return]
shop from which purchases can be made [see ╱business╱shop]

Q
QC parameters [see ╱quality-control parameters]
quality-control parameters
quantum entanglement (analogy, in respect of testing one unit to determine properties of second unit) [see ╱testing]
Qubes OS
Qubes OS / Qubes [see ╱operating system╱different operating systems]
entity behind Qubes OS [see ╱organisations and businesses╱names of non-business organisations╱Qubes OS project]

R
radio frequency
radio-frequency imaging (RF imaging) [see ╱physical properties]
radio-frequency detection (RF detection) [see ╱physical properties]
radio-frequency fields [see ╱RF fields] [see ╱physical properties]
random [related to ╱probability]
generating randomness
coin tossing
rolling dice
Random Access Memory (RAM)
user randomly selecting unit from off physical shelves (broad security principle) [see ╱business╱shop╱physical shop╱physical shelves]
RAM [contrasts with ╱SAM] [see ╱random╱Random Access Memory]
Raspberry Pi
products
Raspberry Pi Zero
Raspberry Pi OS [see ╱operating system╱different operating systems]
creator (of Raspberry Pi products) [see ╱organisations and businesses╱names of non-business organisations╱Raspberry Pi Foundation]
rate limiting
readers (card readers for computer systems) [covered under ╱hardware╱digital-storage hardware╱drives and readers╱]
read only
Read-only Memory (ROM)
microchip-based computer memory [see ╱digital storage╱media, microchip-based computer memory╱ROM]
optical ROM discs (eg. read-only CDs, read-only DVDs) [see ╱digital storage╱media╱non-microchip-based memory╱Random-access Memory╱dis(c|k)-based╱optical]
recycle, recycled, recycling
recycled paper [see ╱paper╱recycled paper]
refund [see ╱financial╱refund]
reflectivity [see ╱optical effects]
refractivity [see ╱optical effects]
regulation (a type of legislation) [see ╱legislation]
restricted viewing enclosure [see ╱view restriction╱cardboard “restricted viewing enclosure”]
remote control (remotely controlling computer)
remote working [related to ..╱home and mobile working]
replay attack [see ╱attack╱different classes of attack]
report, reporting
report cyber-crime to the police (broad security principle)
reproducible builds [see ╱building software╱reproducible builds]
reprogrammable firmware
response and recovery (cf. §“What to do when you discover your computer has been hacked)
return (product return) [see ╱product return]
reverse engineering
rewritable media
RF (radio frequency) [see ╱radio frequency]
rice grains
rolling dice [see ╱random╱generating randomness╱rolling dice]
ROM [see ╱Read-only Memory]
rote memory
router [see ╱hardware╱router]

S
safe (physical safe) [related to ╱physically lock, physical lock]
safe-mode
SAM [contrasts with ╱RAM] [see ╱Sequential Access Memory]
sandboxing [related to ╱cloud computing]
science fiction
screen privacy
screensaver lock [covered under ╱computer screen lock/locking]
screen lock [covered under ╱computer screen lock/locking]
screws
computer screws [see ╱computer screws]
scorched earth [see ╱military╱military policy╱scorched earth]
SD card [see ╱Secure Digital card]
seal (security seal)
Secure Digital card (SD card) [see ╱memory╱flash memory╱SD card]
second hand (used goods, services, etc.) (not brand new)
second hand shop [see ╱business╱shop╱second-hand shop]
secure coding
secure communication [see ╱communication╱secure communication]
security in spite of amnesia (cf. security reminders)
security by pre-loaded private key [see ╱systems╱design╱security by pre-loaded private key]
security via mass adoption
secret criminal society [see ╱secret society╱secret criminal society]
security in cyber secure systems and their design [see ╱design╱design of cyber secure systems]
secret society
secret criminal society
security credentials
secure data sanitisation
security alarm [see ╱alarm╱security alarm]
security bag
security certificate for public-key cryptography (aka asymmetric cryptography)
security certificate for public-key cryptography [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱security certificates]
security certificate for Transport Layer Security (TLS) (digital security certificate) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security╱TLS security certificates]
security community, security researchers
security derived from source-code auditing
security habit
security hole
security invention
security lapse
preventing lapses in security [see ╱broad principles╱preventing lapses in security]
security level (complements ‘threat model’ concept)
think in terms of gradual movement along a security-level continuum (broad security principle)
[see ╱broad security principles╱think in terms of gradual movement along a security-level continuum]
security location for resting [see ╱‘at rest’ security location]
security method publishing (broad security principle) [see ╱broad security principles╱publishing security methods]
security-photo matching software [see ╱software╱security-photo matching software]
security principles that are broad [see ╱broad security principles]
security products and services (cf. §“National Cyber Security Centre”)
Qubes
Linux
GPG [see ╱software tools, software utilities╱cryptography╱GPG]
Heads
Coreboot
Google Authenticator (key- and time- based app)
lock
padlocks
combination lock briefcase

.
security rating [related to ╱security level] [see ╱standards╱security standards╱security rating]
security reminder (cf. Preventing lapses in security) (can sometimes overcome amnesia)
security standards [see ╱standards╱security standards]
security tape
security testing
security tokens
relying on high production cost of certain security tokens (broad security principle) [see ╱broad security principles╱relying on high production cost of certain security tokens]
security tokens for public-key cryptography
USB tokens
brands
Nitrokey
Yubikey, Yubico
Neo
general information on public-key cryptography [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography]
security warning
security whilst asleep [see ╱sleeping, and security when asleep]
security zone [related to ╱broad security principles╱geospatial-based broad security principles]
sellotape
Sequential Access Memory (SAM)
server [see ╱server-client computing model╱server]
server-client computing model
client (client computer/software)
client
thin/fat clients
thin clients (similar to web client computers)
X terminal
fat clients
web client computers (similar to thin clients)
Chromebook, Chromebox, Chromebit
server (computer/software server)
server
server-side processing
Shamir's Secret Sharing [see ╱backup╱backing-up security keys and passwords╱Shamir's Secret Sharing]
shape retention ‘at rest’ [see ╱‘at rest’ shape retention]
shape flexibility (cf. §“Perhaps the simplest and best idea”)
(in relation to shell-suit material, silk scarves, bubble wrap, and plastic bags)
(in relation to bag/pouch)
sharing, share, shared
shell-suit [see ╱shape flexibility╱shell-suit]
shelves
physical shelves [see ╱business╱shop╱physical shop╱physical shelves]
shop [see ╱business╱shop]
shreds, shredding, shredder
shrink-wrapped
shutdown (computer shutdown, there are two types: graceful and hard) [see ╱powering computer systems╱system power states╱sleep mode]
signing/signature (digital signatures in cryptography) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱digital signing╱signatures]
silk
silk scarf/scarves [see ╱shape flexibility╱silk scarves]
single-key password mechanism
sleep (a computer’s sleep mode) [see ╱powering computer systems╱system power states╱sleep mode]
sleeping, and security when asleep
small business [see ╱business╱small business]
smartphone [see ╱phones╱mobile phones╱smartphones]
snooping, snoop
software (cf. listed, advertised, and supported security products and services on NCSC website)
security-photo matching software
installation software
obtaining software
best practice [see ╱best practice╱for obtaining software]
obtained when distributed as pre-installed OEM software
from software repositories such as GitHub’s repositories
OEM software
preinstalled, and as method for obtaining software [see ..╱..╱obtaining software╱obtained when distributed as pre-installed OEM software]
different classes of software
antivirus software [see ╱antivirus software]
apps [see ╱apps]
bootloader [see ╱boot╱bootloader]
cryptography-related [see ╱cryptography, cryptographic╱software]
emulators [see ╱emulators]
internet browser [synonym for ..╱web browser]
operating system [see ╱operating system]
tools, utilities [see ╱software tools, software utilities]
web/internet browser [see ╱web/internet browser]
names of different software mentioned
Android [see ╱operating system╱different operating systems]
ChromeOS [see ╱operating system╱different operating systems]
diff [see ╱software tools, software utilities╱file comparison]
diffoscope [see ╱software tools, software utilities╱file comparison]
Haven: Keep Watch [see ╱apps]
Heads [see ╱boot╱bootloader╱first-stage boot loader]
Chrome internet browser [see ╱web/internet browser]
Coreboot [see ╱boot╱bootloader╱first-stage boot loader]
Google Authenticator (key- and time- based app) [see ╱apps]
GPG [see ╱software tools, software utilities╱cryptography╱GPG]
Linux [see ╱operating system╱different operating systems]
Oracle Cloud Linux [see ╱operating system╱different operating systems]
Qubes OS [see ╱operating system╱different operating systems]
Raspberry Pi OS [see ╱operating system╱different operating systems]
Windows [see ╱operating system╱different operating systems]
Wine [see ╱emulators]
software developer, software development
cf. §”8 Principles of Secure Development & Deployment”
software isolation
software repositories
sole trader [see ╱businesses╱sole trader]
solvent (glue solvent) [see ╱glue╱glue solvents]
source (source code) [see ╱programming╱source code]
‘spot the difference’ (game)
spy, spying, spies, espionage
eavesdropper
stop funding the spies and hackers (broad security principle) [see ╱broad security principles╱stop funding the spies and hackers]
steganographic (steganography)
white-on-white text
stereoscopy[see ╱optical effects]
storage media (digital storage media) [see ╱digital storage╱media╱]
storage components
stranger
submerging in water[see ╱water╱submerging in water]
sunglasses
software tools, software utilities (class of software)
file comparison
diff
diffoscope
cryptography
GPG (GNU’s-Not-Unix! Privacy Guard)
solid-state drive (SSD)
sound
ultrasound
SSD [see ╱solid-state drive]
standards
protocols (there are also protocols that aren’t standards) [see ‘╱protocol’ for such other protocols]
for communication between computing devices [see ╱communication╱communication protocols for computing devices╱protocols that are also standards╱]
for cryptocurrency
Glacier protocol
for cryptography
Transport Layer Security (TLS) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security]
cf. protocols in §”Cryptocurrency-like mining to increase trust”
security rating
cybersecurity
supercomputer
systems
collaborative development
when used for auditing source code changes
GitHub
design
design of cyber secure systems
Too much of the book content is relevant here, for an exhaustive listing.
cf. NCSC information
design to destroy private key when tampering is detected
security by pre-loaded private key
properties
bare bones [roughly opposite of..╱ ‘bells and whistles’]
‘bells and whistles’ [roughly opposite of ..╱bare bones]
blackbox
system clone
system encryption
full-system encryption [see ╱cryptography, cryptographic╱full-system encryption, full-disk encryption]
system power states [see ╱powering computer systems╱system power states]

T
tablet (tablet computer)
tamper
hardware tampering (cf. “USB devices vs. SD cards”)
tamper checking
tamper evident, tamper evidence
tampering attack [computer security attack, see ╱attack╱different classes of attack]
tape (for computer storage) [see ╱digital storage╱Sequential-access Memory╱tape]
taste
tea-bag marbled stained paper [see ╱paper╱tea-bag marbled stained paper]
tears (paper tears)
telecom provider
terminal for X Window System (display/input terminal) [see ╱server-client computing model╱client╱thin/fat clients╱thin clients╱X terminal]
Tesco online printing (UK business) [see ╱business╱online printing businesses]
testing (testing for security authentication)
quantum entanglement (analogy, in respect of testing one unit to determine properties of second unit)
tethering (wired tethering) [see ╱wired tethering]
text (text-message) [related to ╱language] [see ╱communication╱text-message]
tie-dye
thin/fat clients [see ╱server-client computing model╱client╱thin/fat clients]
thinking outside the box [see ╱mental╱thinking outside the box]
Thirty-third Chaos Communication Congress (33c3) [see ╱33rd Chaos Communication Congress]
threat model (term complements ‘security level’ term)
time-based broad security principles (broad security principles) [see ╱broad security principles╱time-based broad security principles]
time window [see ╱window of time]
time zone
Transport Layer Security (TLS) (digital-cryptography based) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security] [related to ╱communication╱communication protocols for computing devices╱protocols that are also standards╱Hypertext Transfer Protocol Secure]
TLS (Transport Layer Security) [see ╱cryptography, cryptographic╱protocols and algorithms╱public-key cryptography╱Transport Layer Security]
tokens for public-key cryptography [see ╱security tokens╱security tokens for public-key cryptography]
tools (software tools) [see ╱software tools, software utilities]
transparency [see ╱optical effects]
translucency [see ╱optical effects]
Trusted Platform Module (TPM)
tossing coin [see ╱random╱generating randomness╱coin tossing]
TPM [see ╱Trusted Platform Module]
TPM binding
TPM sealing
Trammell Hudson (principal developer of the Heads BIOS/UEFI boot firmware system)
transit
physical transit [see ╱physical transit]
treasure map
trustable hardware [see ╱hardware╱trustable hardware]
trusted recipient
television (TV)
T rays [see ╱physical properties╱images╱t rays]
tripod
TV [see ╱television]
two-step security [see ╱2FA]
two-factor authentication [see ╱2FA]
tweaking

U
Unified Extensible Firmware Interface (UEFI) [see ╱boot╱bootloader╱first-stage boot loader]
UEFI [see ╱Unified Extensible Firmware Interface]
unicode [see ╱language╱unicode]
unrepeatable pattern
Universal Serial Bus (USB, standard for computer peripheral communications)
USB adapters
USB connectors
USB keyboard (computer keyboard)
USB memory stick
USB public-key-cryptography security token [see ╱security tokens╱security tokens for public-key cryptography╱USB tokens]
USB[see ╱Universal Serial Bus]
ultrasound [see ╱physical properties]
ultraviolet [see ╱UV]
United Kingdom [see ╱countries mentioned in book╱United Kingdom]
United States of America [see ╱countries mentioned in book╱United States of America]
unrepeatable patterns
utilities (software utilities) [see ╱software tools╱software utilities]
UV (ultraviolet)
UV pen
UV security lamp,
UV protection glasses
UV rays

V
virus (computer virus)
antivirus software [see ╱antivirus software]
<there is so much information relevant here, that it may not be possible to list all of it here.>
visible spectrum
visual display unit (computer screen)
VDU [see ╱visual display unit]
VDU signal interception attack [see ╱attack╱different classes of attack]
video
mobile-phone video
viewing angle [see ╱view restriction╱viewing angle]
view restriction
cardboard “restricted viewing enclosure”
viewing angle
visual cognitive power [see ╱mental╱cognitive power╱visual cognitive power]
visual encoding
visual noise [see ╱noise╱visual noise]
visible spectrum (of light)
visual occlusion [see ╱occlusion] (cf. occlude)
visual inspection
volume (space in 3D) [see ╱physical properties]

W
water
submerging in water
electronics
water-proof container
water-proof container
weak currency [see ╱financial╱currency╱weak currency]
web client computers [see ╱server-client computing model╱client╱web client computers]
web/internet browser
Chrome internet browser
websites referenced in book
https://www.ncsc.gov.uk/
Wikipedia
...
website publishing
weight [see ╱physical properties]
weighing scales [see ╱physical properties]
white-on-white text [see ╱steganography╱white-on-white text]
Wikimedia Foundation [see ╱Wikipedia╱owner of Wikipedia╱Wikimedia Foundation]
Wikipedia
Wikipedia
owner of Wikipedia
Wikimedia Foundation [see ╱organisations and businesses╱names of non-business organisations╱Wikimedia Foundation]
WiFi [see ╱communication╱wireless communication╱types╱WiFi]
window of time
attack window [see ╱attack╱attack window]
using most secure window of time (broad security principle) [see ╱broad security principles╱time-based broad security principles╱using most secure window of time]
Windows (OS) [see ╱operating system╱different operating systems]
Wine Is Not an Emulator (Windows emulator for Unix-like operating systems) [see ╱emulator]
Wine [see ╱Wine Is Not an Emulator]
wired
wired connection
wired tethering
wireless
wireless communication [see ╱communication╱wireless communication]
wireless router
word symbol [see ╱language╱word symbol]
writing optical discs [see ╱hardware╱drives and readers╱optical disc drive╱optical disc writers╱writing optical discs]
"write once" optical media

X
X terminal (display/input terminal for X Window System client applications) [see ╱server-client computing model╱client╱thin/fat clients╱thin clients╱X terminal]
X ray [see ╱physical properties╱image╱X ray]

Y
Yubico and Yubikey brands of USB security tokens [see ╱security tokens╱security tokens for public-key cryptography╱USB tokens╱brands╱Yubikey, Yubico]

Z
zero-knowledge authentication protocol [see ╱protocol]




Foreword to first version

edit
⬆ Up-vote section | Foreword to first version ⬇ Down-vote section | Foreword to first version


This book was first produced in response to a computer hacking incident encountered during 2020 by the author of the first version of this book, in the course of his being a self-employed software developer. He had already adopted some security measures but then felt he really needed an overhaul of the security measures and systems he had in place.

This book is aimed specifically at individuals, sole traders, and small businesses, bearing in mind that they may have shoestring budgets.

It was the author’s belief that end-user security was a real issue of concern because the mindsets of security specialists seemed to be often attuned to examining and proposing solutions within rigid frameworks: such as for example only looking at software security risks but completely ignoring physical aspects of everyday nuts-and-bolts security. A certain element of being able to think ‘outside the box’, and outside one’s own specialised domain, is needed. As such, security is really a multidisciplinary field, requiring the creativity of people from all walks of life.

There is special concern for the highlighted entities (individuals, sole traders, and small businesses), because of their being prone to attack due to budget constraints, and a lack of other important resources.

The author of the first version of the book places his contributions into the public domain (the author’s Google Drive version hosted here [minus the Google Docs comments] will always be in the public domain). He feels that end-user security is so important, that intellectual property obstacles should be removed as much as possible, so as to enable everyday users to be able to undertake computing activities safely. This is especially of concern at the time of writing during the 2020 COVID-19 worldwide outbreak. During this outbreak, individuals are being called upon in great numbers to remote work and also to socialise and conduct recreational activities using computing devices.

The increasing consumer use of cryptocurrencies is another reason why a work like this is important.


The author only asks in return that you, if possible, do the following:

  1. Amend this work to fix mistakes.
  2. Add comments indicating your level of agreement or disagreement with different parts that you read/review.
  3. Improve it in other ways.

Please note that because using your contributions might require that you grant copyright permission for such, it is mostly preferred that you make your contributions to the Wikibooks version of this book[1].




Footnotes

  1. ↑ If you are only pointing out mistakes, or giving quantitative measurements of your agreement/disagreement with parts of this book, copyright permission probably won’t be required.


Back to book cover

Book cover This is the

contents, index, & foreword

Chapter 1
Software based
Next chapter: chapter 1, entitled 'Software based'