Markets flatter our solitary egos but leave our yearnings for community unsatisfied. They advance individualistic, not social, goals, and they encourage us to speak the language of “I want” not the language of “we need.”
—BENJAMIN BARBER, A Place for Us
It is illogical to criticize companies for playing by the current rules of the game. If we want them to play differently, we have to change the rules.
—ROBERT REICH, Supercapitalism
If you think your actions are too small to make a difference, you’ve never been in bed with a mosquito.
The work of building and rebuilding a culture is never finished, because the context—the environment and human activities—is constantly changing. At this moment in history, it’s clear that overconsumption as a way of life can’t continue, but what will take its place? That’s the weighty issue facing us on our desks, on our blog sites, in our state legislatures. Our mission is to invent equitable and efficient ways of meeting our needs in a world of diminishing resources, a changing climate, and a still-rising global population. This is a big moment, and these changes will not be automatic.
School of Computing & Information Science, University of Maine, Orono, Maine, USA
Abstract— This paper examines the 2013 Target Data
Breach in detail with the intent of developing some lessons learned that can serve security educators. The Target Data
Breach originated in the network of a trusted vendor and then spread to Target’s network. The rush to put more objects on the Internet is introducing many vulnerabilities into networks, so Target’s experience of being attacked from a “trusted” source is likely to be repeated from many new sources. This paper then discusses the concept of a “kill chain” and how it could be of use to defenders. Finally, it discusses the relevance of the cyber castle metaphor to the design of hybrid networks and some approaches to building secure hybrid networks.
Keywords: Target Data Breach, Internet of Things, IoT, Cyber