The New Era of Cybersecurity Breaches

The New Era of Cybersecurity Breaches

Author: Graeme Payne

Publisher:

Published: 2019-08-08

Total Pages: 226

ISBN-13: 9781950878024

DOWNLOAD EBOOK

Over the last decade, as companies have continued to march forward on the digitization of everything, the cybersecurity risk profile has continued to change. Since 2005, there have been over 9,000 publicly disclosed data breaches. In the last five years, the financial losses due to cyber-attacks have risen by over 62%. Identifying, mitigating and managing cybersecurity risks in today's environment is a challenging task. On July 29, 2017, Equifax discovered criminal hackers had broken into its systems. Graeme Payne was one of the first senior executives to be told about the attack. Six weeks later, Equifax announced that the personal information of over 140 million US consumers had been exposed in one of the largest data breaches of the 21st Century. What followed was a challenging response that drew widespread criticism. Graeme Payne was fired on October 2, the day before former Chairman & CEO Richard Smith testified to Congress that the root cause of the data breach was a human error and a technological failure. Graeme Payne would later be identified as "the human error". In The New Era of Cybersecurity Breaches, Graeme Payne describes the new era of cybersecurity breaches, the challenges of managing cybersecurity, and the story of the Equifax Cybersecurity Breach. Graeme tells the story of how Equifax became a valuable target for cybercriminals, the conclusions reached by various investigators regarding the cause of the breach, the challenges faced by Equifax in responding to the breach, and the widespread consequences that continue to have an impact. The New Era of Cybersecurity Breaches is a must-read for board members, executives, managers and security leaders. This book will help you understand: The importance of implementing strong procedural, technical, and people controls to secure your systems. Essential lessons in preparing for, and responding to, a major data breach when (not if) one occurs. The critical role boards and senior leaders have in your organization's cybersecurity program. The lessons learned from major cybersecurity breaches, including the Equifax 2017 Data Breach, can be applied to your company to "test and improve" your cybersecurity posture.


You'll See This Message When It Is Too Late

You'll See This Message When It Is Too Late

Author: Josephine Wolff

Publisher: MIT Press

Published: 2018-11-13

Total Pages: 335

ISBN-13: 026234954X

DOWNLOAD EBOOK

What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.


Sandworm

Sandworm

Author: Andy Greenberg

Publisher: Anchor

Published: 2020-10-20

Total Pages: 370

ISBN-13: 0525564632

DOWNLOAD EBOOK

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.


Tomorrowmind

Tomorrowmind

Author: Gabriella Rosen Kellerman

Publisher: Simon and Schuster

Published: 2023-01-17

Total Pages: 288

ISBN-13: 1982159766

DOWNLOAD EBOOK

"As we sit on the cusp of some of the most turbulent economic changes in history, many of us wonder how we can not only survive but flourish in our careers. Now, Tomorrowmind provides ... plans and actionable advice for facing the uncertain future of work, ... [offering] key skills on everything from resilience and innovation to social connection and foresight"--


Smart Cities Cybersecurity and Privacy

Smart Cities Cybersecurity and Privacy

Author: Danda B. Rawat

Publisher: Elsevier

Published: 2018-12-04

Total Pages: 306

ISBN-13: 0128150335

DOWNLOAD EBOOK

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications. - Consolidates in one place state-of-the-art academic and industry research - Provides a holistic and systematic framework for design, evaluating, and deploying the latest security solutions for smart cities - Improves understanding and collaboration among all smart city stakeholders to develop more secure smart city architectures


The Hacker and the State

The Hacker and the State

Author: Ben Buchanan

Publisher: Harvard University Press

Published: 2020-02-25

Total Pages: 433

ISBN-13: 0674245989

DOWNLOAD EBOOK

“A must-read...It reveals important truths.” —Vint Cerf, Internet pioneer “One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” —Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. “A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.” —Jonathan Freedland, New York Review of Books “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.” —General David Petraeus, former Director of the CIA “Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’” —Richard Harknett, former Scholar-in-Residence at United States Cyber Command


Secrets and Lies

Secrets and Lies

Author: Bruce Schneier

Publisher: John Wiley & Sons

Published: 2015-03-23

Total Pages: 453

ISBN-13: 1119092434

DOWNLOAD EBOOK

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.


At the Nexus of Cybersecurity and Public Policy

At the Nexus of Cybersecurity and Public Policy

Author: National Research Council

Publisher: National Academies Press

Published: 2014-06-16

Total Pages: 170

ISBN-13: 0309303214

DOWNLOAD EBOOK

We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities? At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.


Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities

Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities

Author: Butun, Ismail

Publisher: IGI Global

Published: 2021-06-25

Total Pages: 285

ISBN-13: 1799874702

DOWNLOAD EBOOK

Internet of things (IoT) is an emerging research field that is rapidly becoming an important part of our everyday lives including home automation, smart buildings, smart things, and more. This is due to cheap, efficient, and wirelessly-enabled circuit boards that are enabling the functions of remote sensing/actuating, decentralization, autonomy, and other essential functions. Moreover, with the advancements in embedded artificial intelligence, these devices are becoming more self-aware and autonomous, hence making decisions themselves. Current research is devoted to the understanding of how decision support systems are integrated into industrial IoT. Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities presents the internet of things and its place during the technological revolution, which is taking place now to bring us a better, sustainable, automated, and safer world. This book also covers the challenges being faced such as relations and implications of IoT with existing communication and networking technologies; applications like practical use-case scenarios from the real world including smart cities, buildings, and grids; and topics such as cyber security, user privacy, data ownership, and information handling related to IoT networks. Additionally, this book focuses on the future applications, trends, and potential benefits of this new discipline. This book is essential for electrical engineers, computer engineers, researchers in IoT, security, and smart cities, along with practitioners, researchers, academicians, and students interested in all aspects of industrial IoT and its applications.


Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering

Author: John M. Borky

Publisher: Springer

Published: 2018-09-08

Total Pages: 788

ISBN-13: 3319956698

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.