• Complain

Greg Scott - Bullseye Breach: Anatomy of an Electronic Break-In

Here you can read online Greg Scott - Bullseye Breach: Anatomy of an Electronic Break-In full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2015, publisher: Beavers Pond Press, genre: Art. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Greg Scott Bullseye Breach: Anatomy of an Electronic Break-In
  • Book:
    Bullseye Breach: Anatomy of an Electronic Break-In
  • Author:
  • Publisher:
    Beavers Pond Press
  • Genre:
  • Year:
    2015
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Bullseye Breach: Anatomy of an Electronic Break-In: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Bullseye Breach: Anatomy of an Electronic Break-In" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Ripped from recent headlines, this gripping cyber-attack tale has all the elements of an international thriller, including a floating corpse in the Gulf of Finland. Meet an underground criminal supply chain, its innocent victims, and an unlikely midwestern IT group with an ingenious way to fight back against the theft of millions of credit-card numbers. If data breaches were not routine by now, this story would be unbelievable. Instead, its a snapshot of life in todays interconnected world, and an unforgettable Internet safety education. IT security has never been so riveting!

Greg Scott: author's other books


Who wrote Bullseye Breach: Anatomy of an Electronic Break-In? Find out the surname, the name of the author of the book and a list of all author's works by series.

Bullseye Breach: Anatomy of an Electronic Break-In — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Bullseye Breach: Anatomy of an Electronic Break-In" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Bullseye
Breach

ANATOMY OF AN ELECTRONIC BREAK-IN

Greg Scott


Copyright 2015 by Greg Scott

All rights reserved. No part of this book may be reproduced by any mechanical, photographic,or electronic process, or in the form of a phonographic recording, nor may it be stored in a retrieval system, transmitted, or otherwise be copied for public or private use, other than forfair use as brief quotations embodied in articles and reviews without prior written permission of the publisher.

ISBN 13: 978-1-59298-877-8

Library of Congress Catalog Number: 2015903779

Printed in the United States of America

First Printing: 2015

19 18 17 16 15 5 4 3 2 1

Edited by Steve LeBeau, Lily Coyle, and Alicia Ester
Cover and interior design by Laura Drew.
Cover photography shutterstock.

Beavers Pond Press
7108 Ohms Lane
Edina, MN 554392129
952-829-8818
www.beaverspondpress.com

Dedicated to the unsung heroes on the front lines in bank fraud departments - photo 1Dedicated to the unsung heroes on the front lines in bank fraud departments - photo 2


Dedicated to the unsung heroes on the front lines in bank fraud departments across the United States. Especially to Kim, with the real-world US Bank Fraud Department, who saved my butt when she helped me track down at least $14,773.92 in attempted fraudulent transactions on my own credit card on Dec. 1, 2011.

And to the IT security professionals in the trenches who work hard to keep us safe on the Internet. May everyone who reads this book heed their warnings.


Ripped from recent headlines, this gripping cyber-attack tale has all the elements of an international thriller, including a floating corpse in the Gulf of Finland. Meet an underground criminal supply chain, its innocent victims, and an unlikely midwestern IT group with an ingenious way to fight back against the theft of millions of credit-card numbers. If data breaches were not routine by now, this story would be unbelievable. Instead, its a snapshot of life in todays interconnected world, and an unforgettable Internet safety education. IT security has never been so riveting!

A Michael Crichton-like whirlwind story thats very hard to put down once you pick it up. Part mystery, part suspense, part education, part technology, and all entertainment.

Ken Steinhardt, computer scientist and retired former VP, EMC Corporation

A perfect foray into how things can go terribly wwrrroonnggg... And all it took to get started was One Thoughtless .

Winn Schwartau, CEO of The Security Awareness Company and author of Information Warfare and Pearl Harbor Dot Com (Die Hard IV)

After reading the book, I actually have a better idea of how a multi-vector compromise happens, and how the little signs that should have been caught were missed. Hits the nail squarely.

Al Gillen, program VP, Servers and System Software, IDC

Greg Scott is a veteran of the tumultuous IT industry and the founder of - photo 3 Greg Scott is a veteran of the tumultuous IT industry, and the founder of Infrasupport Corporation, with a laser focus on infrastructure and security. In the 1990s, he was a popular columnist for magazines ENT and Enterprise Linux . He currently lives in the Twin Cities with his wife, daughter, and two grandchildren.


Contents


Prologue: Why Yet Another Book on IT Security?

Several years ago, I visited a potential customer and showed her how her business was vulnerable to cyberattacks. But I made a mistakeI used a computer and computer screens to illustrate the threats she faced. It was a short meeting. As I tried to explain subjects such as malware and phishing and open TCP ports and IP addresses and NAT, and the threats she faced, she told me she already had somebody who could reset passwords and showed me the door.

Another time, I met with an executive at a bank who also wanted me to go away. In an effort to show he already had all the security he needed, he confidently handed me a folder with the results from a security study he paid somebody else to do. I looked over the report, and then said, This looks good. They did a good job describing the issues around your website. Wheres the part about your internal network right here at the bank?

His reply was quick. Thanks for coming by. Theres the door and have a nice day.

Another time, I ran a virus scan on the store computer at a small retailer and found hundreds of compromised files. When I tried explaining that sharing her public Wi-Fi service with her private store network was like walking into a closed room full of contagious people, she called her bookkeeper and decided it wasnt worth her time or money to fix it. It was another short meeting.

Ive seen countless scenarios play out in hundreds of organizations over the years and they all have one common attributea decision maker either unable or unwilling to believe IT security issues are relevant.

And after all these years, maybe I finally get it. IT concepts are abstract and business decision makers dont deal in the abstract. They deal in the here and now. Security practitioners need to adjust how we present this stuff.

So this book tells a fictional story, inspired by recent headlines, about a large scale attack. Youll meet some bad guys, the clueless, a few victims, and some good guys who come up with a creative way to fight back.

Take away three real-world lessons:

  1. Youre right; you probably dont have any secrets anyone cares about. But youre not the target; youre part of the path to the target. Maybe somebody fooled you into running the wrong program and now he or she wants you to pay a ransom to unscramble all your company documents. Or maybe somebody is using you to steal somebody elses secrets. Either way, the fallout will be bad for your business. Just ask Max Rousseau. Or Frank Wright. Or even better, Franks son.
  2. The Internet criminal industry is well funded, resourceful, and smart. The bad guys have an entire value chain, including raw material suppliers, manufacturers, logistics, and end user customers. Its an arms race and the good guys are outnumbered and outgunned.
  3. Your security practices have real-world consequences, some of them far beyond your company walls. Read about Regina Lopez, who represents millions of real-world innocent victims ensnared by the poor security practices of one large retailer.

The threats are real and the scenarios presented in this book are adapted from real life. Dont bury your head in the sand and pretend your IT systems are not important just because you dont understand them. The Internet is here to stay and you need to protect the confidentiality, integrity, and availability of your data. The future of your company depends on it.

I hope you enjoy reading this story as much as I enjoyed getting to know the characters and writing it.

One more note to keep me out of hot water: although inspired by real life events, the story in this book is straight out of my imagination. Its fiction. I made it up. All characters appearing in this work are fictitious. Any resemblance to real persons, living or dead, is purely coincidental.


All warfare is based on deception.

Sun Tzu , Chinese strategist (544 - 496 BC)

Cybercrime Seminar

Beneath every inch of the Internet superhighway is a vast sewer system, the underground home of cybercriminals who

Jerry Barkley abruptly paused in the middle of his speech on cybercrime, because he suddenly realized he was the only man in the room not wearing a suit. He gazed across the audience at the Retail Council monthly luncheon tucked in a second floor conference room in the Minneapolis Convention Center. These executives and their staffs represented the entire gamut of retail stores in Minneapolis, from Fortune 500 companies to small businesses. Some wore custom-tailored Italian silks, some wore off-the-rack polyester, but they all wore suits. Jerry didnt feel inferior as much as he just felt out of place. Most of his friends were people in low places, regular folks who valued him for his independent spirit and practical knowledge of computers and networking. They didnt care that he wore tennis shoes and slightly faded khakis. Besides, for this lunchtime talk he wore his very best sweater, the one with all the swirly colors that reminded him of modern art. As far as Jerry was concerned, he was plenty dressed up for the occasion.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Bullseye Breach: Anatomy of an Electronic Break-In»

Look at similar books to Bullseye Breach: Anatomy of an Electronic Break-In. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Bullseye Breach: Anatomy of an Electronic Break-In»

Discussion, reviews of the book Bullseye Breach: Anatomy of an Electronic Break-In and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.