Anderson was appointed a lecturer at Cambridge in 1995.[4] In addition to teaching at the University of Cambridge, he also taught at the University of Edinburgh.[11]
Anderson always campaigned for computer security to be studied in a wider social context. Many of his writings emphasised the human, social, and political dimension of security. On online voting, for example, he wrote "When you move from voting in person to voting at home (whether by post, by phone or over the Internet) it vastly expands the scope for vote buying and coercion",[16] making the point that it's not just a question of whether the encryption can be cracked.
Anderson was also a founder of the UK-Crypto mailing list and the economics of security research domain.[18]
Anderson was well-known among Cambridge academics as an outspoken defender of academic freedoms, intellectual property and other matters of university politics. He was engaged in the "Campaign for Cambridge Freedoms"[19] and had been an elected member of Cambridge University Council since 2002.[20] In January 2004, the student newspaper Varsity declared Anderson to be Cambridge University's "most powerful person".[21]
Anderson's TCPA FAQ has been characterised by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."[23]
For years Anderson argued that by their nature large databases will never be free of abuse by breaches of security. He said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule.[24]
Anderson was the author of several editions of Security Engineering, which was initially published by Wiley in 2001.[5][11] He was the founder and editor of Computer and Communications Security Reviews.[2]
After the vast global surveillance disclosures leaked by Edward Snowden beginning in June 2013, Anderson suggested one way to begin stamping out the British state's unaccountable involvement in this NSA spying scandal was to entirely end the domestic secret services. Anderson: "Were I a legislator, I would simply abolish MI5". Anderson noted the only way this kind of systemic data collection was made possible was through the business models of private industry. The value of information-driven Web companies such as Facebook and Google is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.[25]
Anderson was a critic of smart meters, writing that there are various privacy and energy security concerns.[26]
Professor Ross Anderson, Personal Chair in Security Engineering, Computer Laboratory, University of Cambridge.
Ross Anderson was a pioneer and world leader in security engineering, and is distinguished for starting a number of new areas of research in hardware, software and systems.
His early work on how systems fail established a base of empirical evidence for building threat models for a wide range of applications from banking to healthcare.
Anderson was also one of the founders of the study of information security economics, which not only illuminates where the most effective attacks and defences may be found, but is also of fundamental importance to making policy for the information society.[27]
Anderson met his wife, Shireen, while he was working in Johannesburg and they were married in Cambridge in 1992. Shireen Anderson is the coordinator of the Christina Kelly Association, of Churchill College, Cambridge.[32] They have one daughter, Bavani, and four grandchildren.
Anderson died unexpectedly at home with his family in Cambridge on 28 March 2024, at the age of 67.[33][11]
Security Engineering
By agreement with the publisher [1], the third edition of Ross Anderson's book Security Engineering was made available for download at the Cambridge University archive in November 2024. [2]
^The Blue Book – "The Computer Laboratory: an Introduction", University of Cambridge Computer Laboratory, August 2007 Archived 5 August 2012 at the Wayback Machine
^Anderson, Ross J. (1995), "On Fibonacci keystream generators", Fast Software Encryption, Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, pp. 346–352, doi:10.1007/3-540-60590-8_26, ISBN978-3-540-60590-4
^Porter, Henry (2009). "Nine sacked for breaching core ID card database". theguardian.com. London: The Guardian. Anderson's Rule means you cannot construct a database with scale, functionality and security because if you design a large system for ease of access it becomes insecure, while if you make it watertight it becomes impossible to use