• Complain

Gary Rivlin - Becoming an Ethical Hacker

Here you can read online Gary Rivlin - Becoming an Ethical Hacker full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: Simon Schuster, genre: Art. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Gary Rivlin Becoming an Ethical Hacker
  • Book:
    Becoming an Ethical Hacker
  • Author:
  • Publisher:
    Simon Schuster
  • Genre:
  • Year:
    2019
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Becoming an Ethical Hacker: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Becoming an Ethical Hacker" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

An acclaimed investigative journalist explores ethical hacking and presents a reader-friendly, informative guide to everything there is to know about entering the field of cybersecurity.
Its impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. InBecoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where its going, while providing vivid case studies illustrating how to become one of these white hats who specializes in ensuring the security of an organizations information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity.

Gary Rivlin: author's other books


Who wrote Becoming an Ethical Hacker? Find out the surname, the name of the author of the book and a list of all author's works by series.

Becoming an Ethical Hacker — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Becoming an Ethical Hacker" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make



M ASTERS AT W ORK




B ECOMING A N EUROSURGEON

B ECOMING A V ETERINARIAN

B ECOMING A V ENTURE C APITALIST

B ECOMING A H AIRSTYLIST

B ECOMING A R EAL E STATE A GENT

B ECOMING A M ARINE B IOLOGIST

B ECOMING AN E THICAL H ACKER

B ECOMING A L IFE C OACH

A LSO A VAILABLE

B ECOMING A Y OGA I NSTRUCTOR

B ECOMING A R ESTAURATEUR

B ECOMING A P RIVATE I NVESTIGATOR

B ECOMING A B AKER

B ECOMING A S OMMELIER

B ECOMING A C URATOR

B ECOMING AN A RCHITECT

B ECOMING A F ASHION D ESIGNER

Simon Schuster 1230 Avenue of the Americas New York NY 10020 - photo 1

Picture 2

Simon & Schuster

1230 Avenue of the Americas

New York, NY 10020

www.SimonandSchuster.com

Copyright 2019 by Simon & Schuster, Inc.

All rights reserved, including the right to reproduce this book or portions thereof in any form whatsoever. For information, address Simon & Schuster Subsidiary Rights Department, 1230 Avenue of the Americas, New York, NY 10020.

First Simon & Schuster hardcover edition May 2019

SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster, Inc.

For information about special discounts for bulk purchases, please contact Simon & Schuster Special Sales at 1-866-506-1949 or .

The Simon & Schuster Speakers Bureau can bring authors to your live event. For more information or to book an event, contact the Simon & Schuster Speakers Bureau at 1-866-248-3049 or visit our website at www.simonspeakers.com.

Library of Congress Cataloging-in-Publication Data is available.

Jacket design by Alison Forner

Jacket images by Mona Monash And Vectorchoice/Getty Images

ISBN 978-1-5011-6791-1

ISBN 978-1-5011-6792-8 (ebook)

T O MY MOTHER , N AOMI R IVLIN, WITH LOVE

PROLOGUE

A ngela Gunn is fried. This is one of those frantic periods when it feels as if she works in an ER or at a fire station rather than holding a staff position with a computer security firm. Its just after Labor Day 2018, and shes chosen as our meeting place a caf with a dive-bar vibe in a trendy stretch of Seattles downtown. Called Bedlam, Gunn declared the place thematically appropriate for any discussion that involves her life and job. A frazzled Gunn plops down in a seat across from mine. Im a hot mess today, she declares.

This is her life every August, Gunn explains. Invariably, its the same around Christmas and New Years as well. Shes busiest when the rest of the world is on vacation and online fraud peaks. People attack when they think your guard is down, Gunn says. At the time of my visit, she was juggling three cases. That made for a hectic August that spilled into September. All three were coming to a close, but she had been roped into a fourth. I was up till four a.m. last night and it wasnt even one of my cases, she says. The late hours were because she needed to speak with the firms malwaremalicious softwarespecialist, who lives in Australia. A brilliant guy. I respect the hell out of him, Gunn says. I just wish he didnt live nineteen time zones away. Her job over the next twenty-four to forty-eight hours will be to find the people her firm needs for this latest case. My guy cant get here so I need to find boots on the ground, she says. So now its about making alliances with people known for wearing hats that are some shade of white.

Gunn orders a tall Rose Mocha latte that the menu describes with flowery prose: Imagine walking in a garden, cool and in the bright sun, a fountain splashing softly, the faint sweet scent of roses & chocolate full of Eastern promise. After reading it out loud to me, Gunn starts rattling off jokes about the new Seattle (she first moved to the city in the late 1990s) and for good measure takes a couple of biting digs at Amazon, which she and others I meet with while in town cast as an Evil Empire, practically swallowing whole the city they love. She brightens when her Rose Mocha arrives. Its been a rough few weeks, Gunn tells me, I could use a cool walk through a garden right about now.

Its people like Gunn that organizations large and small call if theyve had a data breach or suspect they have. People in the industrycybersecurity, if youd like, though Gunns preference is information security, or info-sec for shortcall this incident response. To my mind, though, theyre the online worlds firefighters: those who rush to put out the flames and then assess the damage. Ten years ago, Gunn was working as a tech journalist. Now she works full-time for a long-standing British security firm called BAE Systems, which hired her a couple of years earlier to help them establish a presence in Seattle. Her title is incident response consultant, and its her job to assemble the small crew she needs for each case. Typically, that includes an analyst who can pore over computer logs, a malware specialist, and those she dubs forensic workers, except without the formaldehyde smell and ripped-open chest cavities. Thats if she can find any live bodies to do the work.

Right now, Id sell a right toe for a forensics guy, Gunn says. Like a lot of people in info-sec right now, were agonizingly understaffed.

That morning she had been on the University of Washington campus for the quarterly gathering of the Seattle-area computer security group to which she belongs. As usual, that days talk, about the special precautions a security team must take to protect power grids, water treatment centers, and other critical infrastructure, was off-the-record. The idea, she explains, is to create a safe space for people so they can speak freely without fear of the consequences. Its a network of trust. Except when it comes to stealing everyones best people, she says. People dont say hello so much as let one another know what postings they have that remain open. A typical conversation goes, Oh my God, where did you land? Theyll say Amazon and you ask, Oooo, are you okay? Gunn has been in the business for eight yearsif not quite an old hand, then someone who has learned a lot since taking a job at Microsoft, in 2010, where she helped manage the companys message to the wider world when a bug hit Windows or another Microsoft product.

People in security are changing jobs it seems every year, if not every six months, Gunn says. At the meeting just now, I was like, Maybe one of you guys is my next analyst. Except theyre hoping Ill join their team. A 2015 report by

I T WASNT THAT LONG ago that computer security was more of a niche job categorya wise career choice, perhaps, but a specialty that relegated an employee to a backwater of the computing world. The release of the 1983 movie WarGames woke up many to the importance of cybersecurity in a digital age, including then president Ronald Reagan, who saw the movie the day after its release. Reagan was among those frightened by its depiction of Matthew Broderick as a teen tech whiz who unwittingly breaks into a military computer and nearly triggers World War III. Fifteen months later, in September 1984, the National Security Agency, or NSA, released a policy directive dryly titled, National Policy on Telecommunications and Automated Information Systems Security. The generals and spy chiefs around Reagan concluded that the film wasnt as far-fetched as they might have hoped. The governments systems, the policy directive said, were highly susceptible to attack by foreign powers, terrorist groups, and criminals. Yet networking was still an esoteric issue then, even among computer scientists, and personal computers were only starting to appear inside corporate America and in peoples homes. Most people working info-sec then toiled in the bowels of the Pentagon or worked for a big defense contractor.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Becoming an Ethical Hacker»

Look at similar books to Becoming an Ethical Hacker. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Becoming an Ethical Hacker»

Discussion, reviews of the book Becoming an Ethical Hacker and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.