INVITATION TO CYBERSECURITY 334 Figure 5.2: A pair of shoes concealing explosives that were successfully snuck through airport security. https://commons.wikimedia.org/wiki/File:Richard_Reid%27s_Shoes.jpg Figure 5.5: A screenshot of a ransomware note. https://commons.wikimedia.org/wiki/File:Ransom_Note_of_Petwrap.jpg Figure 6.2: The triarchic theory applied to hackers. https://commons.wikimedia.org/wiki/File:Gros_-_First_Consul_Bonaparte_(Detail). png https://commons.wikimedia.org/wiki/File:Self-portrait_-_Vincent_van_Gogh.jpg https://commons.wikimedia.org/wiki/File:%22Cabeza_de_Einstein%22.jpg Figure 6.7: The Colonel Blotto game. https://commons.wikimedia.org/wiki/File:General_Charles_George_Gordon_statue,_Embankment,_London_(2).JPG https://commons.wikimedia.org/wiki/File:Gouverneur_K._Warren_Gettysburg_statue.jpg Figure 7.15: Prisoner of war Jeremiah Denton saying all the right words while blinking the word TORTURE in Morse code. https://commons.wikimedia.org/wiki/File:JamesDentonHanoi1966NatArchiv.jpg Figure 8.3: A physical authentication token that displays a series of random numbers. https://commons.wikimedia.org/wiki/File:RSA_SecurID_SID800.jpg Figure 9.6: A diagram of the Titanic illustrating the compartmentalization principle. https://commons.wikimedia.org/wiki/File:Titanic_side_plan_annotated_English.png Figure 10.2: Rosa Parks police report. https://commons.wikimedia.org/wiki/File:Rosaparks_policereport.jpg Figure 10.3: Export-controlled munitions shirt from the Crypto Wars. https://commons.wikimedia.org/wiki/File:Munitions_T-shirt_(front).jpg
RkJQdWJsaXNoZXIy MTM4ODY=