If It’s Smart, It’s Vulnerable
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

If It’s Smart, It’s Vulnerable

 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9781119895206
Veröffentl:
2022
Einband:
E-Book
Seiten:
288
Autor:
Mikko Hyppönen
eBook Typ:
EPUB
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Reimagine the future of the internet All our devices and gadgets from our refrigerators to our home security systems, vacuum cleaners, and stereos are going online, just like our computers did. But once we ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It s Smart, It s Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best and worst things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosecPerfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It s Smart, It s Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.
Reimagine the future of the internetAll our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters?In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best--and worst--things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more.Readers will also find:* Insightful discussions of how law enforcement and intelligence agencies operate on the internet* Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology* Explorations of how the internet has changed the world, for better and for worse* Engaging stories from Mikko's 30-year career in infosecPerfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.
Foreword: Jeff Moss xiiiPreface xviiSaab 9000 Turbo xxiThe Good and the Bad of the Internet 1Prehistoric Internet 2The First Websites 5Linux Is the World's Most Important System 7iPhone vs. Supercomputer 10Online Communities 11Money Is Data 13Codes All Around Us 14Geopolitics 17Security Tetris 21Who Are We Fighting? 24Schoolboys 24Spammer 26Professional Cybercrime Groups 28Extremists 29The Rolex 30Malware--Then, Now, and in the Near Future 33The History of Malware 34Viruses on Floppies 34Brain.A 35File Viruses 43Macro Viruses 43Email Worms 45Internet Worms 46The Virus Wars 49Web Attacks 51Mobile Phone Viruses 51Worms on Social Media 54Smartphones and Malware 55Law Enforcement Malware 57Case R2D2 58Cracking Passwords 59When a Hacker Spilled Her Coffee 60Ransomware Trojans 61The History of Ransomware Trojans 61Cryptolocker 64Honest Criminals 65Notpetya 65Case Maersk 67Wannacry 71My Week with Wannacry 72Targeted Ransomware Trojans 76Ransomware Trojans v2 77The Human Element 79The Two Problems 80The Heist 82CEO Fraud 89Touring the Headquarters 92Protecting Company Networks 95Zero Trust 100Bug Bounties 101Wi- Fi Terms of Use 110Mikko's Tips 112Mikko's Tips for the Startup Entrepreneur 114Boat for Sale 118What If the Network Goes Down? 121Electrical Networks 122Security in Factories 124A Search Engine for Computers 126Slammer 128Hypponen's Law 130Dumb Devices 132Regulation 134Car Software Updates 136Online Privacy 137Life Without Google 138Murder Charges Never Expire 139Is Google Listening to You? 142Gorillas 143Startup Business Logic 145Biometrics 147Antisocial Media 149Online Influencing and Elections 151Privacy Is Dead 153Before and After Gmail 156Encryption Techniques 160Perfect Encryption 160Unbreakable Encryption 161Criminal Use of Encryption Systems 162Data Is The New Uranium 166CASE Vastaamo 168Patient Registry 169Technologies 170Vastaamo.tar 171Extortion Messages 173The Hunt for the TAR File 175Innocent Victims 177Cryptocurrencies 179The Value of Money 180Blockchains 181Blockchain Applications 182Blockchains and Money 183The Environmental Impacts of Bitcoin 185Playing the Market 187Ethereum, Monero, and Zcash 189Nft 191Bitcoin and Crime 193Border Guards vs. Bitcoin 195Technology, Espionage, and Warfare Online 199Cyberweapons 200Lunch Break at Google 201Technology and Warfare 202Under a False Flag 204Concealability of Cyberweapons 205The Fog of Cyberwar 207Case Prykarpattyaoblenergo 211Case Pyeongchang 213Governments as Malware Authors 214Russia and China 216Case Stuxnet 217Damage Coverage 226Explosion at the White House 227My Boycott of RSA, Inc 229The Future 233Artificial Intelligence 234Wolverines 237AI Will Take Our Jobs 238Smart Malware 239Metaverse 240The Technology of Warfare 241"You Are Under Arrest for a Future Murder" 242Those Who Can Adapt Will Prosper 243Tesla 245Trends in Technology 247Coda 249Index 251

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.