• Complain

Nirmal John - Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe

Here you can read online Nirmal John - Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Penguin, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Nirmal John Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe
  • Book:
    Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe
  • Author:
  • Publisher:
    Penguin
  • Genre:
  • Year:
    2017
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A journalist accused of hacking the inbox of a billionaire A company which fought back when it s data was stolen An entrepreneur who fought an international battle to end piracy A hacker who decided to take a start-up hostage by stealing its data Full of riveting stories of hackers, police and corporates, Breach reads like athriller. The book brings to light several incidents which till now were brushedunder the carpet. It has instances of piracy, data theft, phishing, among manyothers. Even though he focuses on India, Nirmal John takes great pains to show linksbetween underground international networks working to undermine data security.

Nirmal John: author's other books


Who wrote Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe? Find out the surname, the name of the author of the book and a list of all author's works by series.

Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
NIRMAL JOHN BREACH Remarkable Stories of Espionage and Data Thef - photo 1
NIRMAL JOHN BREACH Remarkable Stories of Espionage and Data Theft and The Fight - photo 2
Breach Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe - image 3
NIRMAL JOHN
BREACH
Remarkable Stories of Espionage and Data Theft and The Fight to Keep Secrets Safe
Breach Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe - image 4
PENGUIN BOOKS
Breach Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe - image 5
PENGUIN BOOKS

PORTFOLIO

BREACH

Nirmal John is scared of artificial intelligence. When not dreaming up scary scenarios of a future dictated by machines, he loves observing and recording life at the intersection of technology, culture and business. He is a journalist who has worked with Fortune India and is currently with the Economic Times Online in Bengaluru. This former adman loves telling stories of people who have embarked on crazy adventures (or misadventures) in an increasingly tech-obsessed world. He is also the winner of the Prize for Economic Journalism in Asia, 2016, awarded by the IE Business School in Madrid, Spain.

Advance Praise for the Book

Breach is a fascinating book on data theft. Its educative, its informative, its insightful! Nirmals book is thought-provoking, superbly researched and deftly crafted. He is an engaging writer who combines the nuts and bolts of data theft with a deeply felt sense of India and shows how to combat it. This is a remarkable saga of data protection and data security. The lucid, open-hearted account makes for an interesting and informative read for experts, academics and practitioners alikeAmitabh Kant, CEO, NITI Aayog

Unputdownable! Nirmal tackles a complex and tricky subject with the craft of a novelist combined with the skills of an investigative journalist. The book is a page-turner where you feel the childlike excitement of finding out what lies beyond that closed door!Aditya Ghosh, president and whole-time director, IndiGo

A fascinating, and scary, sweep of the many different types of data breaches we are susceptible to, written in a fast-paced mystery-novel style. If this book does not make you realize the enormity of the problem, nothing willAjit Rangnekar, former dean, Indian School of Business

To Appa and Amma

Ive never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads.

Elliot Alderson, a character from the TV series Mr Robot

Preface

Im Bruce Wayne. Im also Peter Parker. At times, I am Rajinikanth.

One of the greatest things about my job as a business journalist is that no two days are the same. I get to talk to extremely interesting people on subjects as varied as the economics of asteroid mining, delivering education to a screen-obsessed generation, or the impact of artificial intelligence on the travel industry.

There is always the option to have these meetings in a local cafe. But I prefer going to their offices because I believe it reveals more about the person Im meeting and provides what my editor calls colour. It was during one of these trips to an office a few years back that I started my experiments with multiple personalities.

The first person to welcome me in nearly all the offices I visit is the security guard, usually clad in an ill-fitting uniform in a not-so-fetching shade of blue and a cap perched uncomfortably on his head. He usually sits on a plastic chair behind a small desk, with both the chair and the desk out of sync with rest of the office decor. As I walk in, he asks if I have an appointment, and as soon as I answer that question, he thrusts a large register in front of me.

Sir, entry kar lo. [Please enter your name.]

I nod and proceed to write my name. Then, without even as much as a glance at what I have written in the register, he motions me inside the office.

One day, in 2012, this flow changed. I had a meeting with the managing director of a multinational firm in Gurgaon for a story that I was working on. As usual, I was about to enter my name in the register when a thought occurred to me. Did it matter what I wrote in the register? Would they know if I put in a fake name? Were the guards really keeping a track of visitors by the information they provided about themselves?

It was around the time when the third movie in Christopher Nolans Batman trilogy, The Dark Knight Rises, had come out. Instead of writing my name, I wrote Bruce Wayne, Gotham City. I was a tad apprehensive of getting caught and being embarrassed, but I neednt have bothered.

I was ushered right in.

It was too easy. Since then I have passed myself off as Peter Parker, David Beckham and Rajinikanth in offices in Bengaluru, Mumbai, New Delhi, Noida, Gurgaon, Faridabad, Ghaziabad, Ahmadabad, Pune, Kochi, Hyderabad, Mysore, Jaipur, Chennai and many other cities. I have written these names at the offices of Indias biggest start-ups to its biggest financial institutions and largest conglomerates and everything in between. I have even done it in companies that provide security services, both digital and physical.

There are rare offices which ask for your identification and those, of course, stay out of bounds for my little superhero transformations. But most offices dont ask for anything more than a cursory entry into the register.

This little experiment got me thinking. If it was as easy as that for an amateur like me to saunter into the offices of some of the biggest companies in the country, without even having to disclose my real name, what about those with nefarious intent? How often did those with malicious ideas do what I did? More importantly, did those who were adept at the art of deception even break into a sweat if and when they wanted to steal information? Why werent Indian companies investing in better security? Why wasnt I getting caught?

Theres more. We have stepped well and truly into a digital world. Although data has always been valuable in the context of most businesses, it has now acquired an altogether elevated stature. The Economist called data the new oil. Much of the obnoxiously high valuations for technology companies in the e-commerce era currently underway in India and around the world are not based on how much they sell, but on how much they know. Google, Facebook, Amazon, Alibaba, Tesla and Flipkart have become valuable because of this access to data.

In India, if it is so easy to find holes in the wall of physical security that Indian businesses build around them, how robust is their digital security? More importantly, how robust are the security practices pertaining to how the government handles this new era of data? After all, data is the currency of this century and any compromise on data integrity is an existential risk, not just for businesses but also for countries.

There are instances aplenty of hacking and stolen data from the most advanced of economies. Big names in business, including Sony,

In the following pages, you will read a few instances of data theft in India and how those fighting the threat reacted. As India grows and as more and more people move online, it becomes an even juicer target for criminals. Any number of reasons, from corporate espionage to cyberwarfare to financial gain to geopolitical manoeuvring to stalking, might motivate this criminal behaviour. There are many black hat hackers who do what they do simply because they can. What is certain is that the wealth of data that is being collected by companies and the government will constantly be under threat from those who want a peek.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe»

Look at similar books to Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe»

Discussion, reviews of the book Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.