• Complain

Charlie Mitchell - Hacked: the inside story of Americas struggle to secure cyberspace

Here you can read online Charlie Mitchell - Hacked: the inside story of Americas struggle to secure cyberspace full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2012, publisher: Rowman & Littlefield Publishers, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Charlie Mitchell Hacked: the inside story of Americas struggle to secure cyberspace
  • Book:
    Hacked: the inside story of Americas struggle to secure cyberspace
  • Author:
  • Publisher:
    Rowman & Littlefield Publishers
  • Genre:
  • Year:
    2012
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Hacked: the inside story of Americas struggle to secure cyberspace: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacked: the inside story of Americas struggle to secure cyberspace" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The spectacular cyber attack on Sony Pictures and costly hacks to Sony, Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep comingeach one more pernicious than the lastfrom China, Russia, Iran, North Korea, the Middle East, and points unknown. The continuing attacks raise a deeply disturbing question: Is the issue simply beyond the reach of our government, political leaders, business leaders, and technology visionaries to resolve? In Hacked, veteran cybersecurity journalist Charles Mitchell reveals the innovative, occasionally brilliant, and too-often hapless government and industry responses to growing cybersecurity threats. He examines the internal power struggles in the federal government, the paralysis on Capitol Hill, and the industrys desperate...

Charlie Mitchell: author's other books


Who wrote Hacked: the inside story of Americas struggle to secure cyberspace? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hacked: the inside story of Americas struggle to secure cyberspace — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hacked: the inside story of Americas struggle to secure cyberspace" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Hacked


Hacked

The Inside Story of America's Struggle to Secure Cyberspace

Charlie Mitchell


ROWMAN & LITTLEFIELD

Lanham Boulder New York London

Published by Rowman & Littlefield

A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc.

4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706

www.rowman.com


Unit A, Whitacre Mews, 26-34 Stannary Street, London SE11 4AB


Copyright 2016 by Rowman & Littlefield


All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by a reviewer who may quote passages in a review.


British Library Cataloguing in Publication Information Available


Library of Congress Cataloging-in-Publication Data


Names: Mitchell, Charlie, 1962- author.

Title: Hacked : The inside story of America's struggle to secure cyberspace / Charlie Mitchell.

Description: Lanham : Rowman & Littlefield, 2016. | Includes bibliographical references and index.

Identifiers: LCCN 2016006180 (print) | LCCN 2016016849 (ebook) | ISBN 9781442255210 (cloth : alk. paper) | ISBN 9781442255227 (electronic)

Subjects: LCSH: Internet--Government policy--United States. | Computer security--Government policy--United States. | Cyber intelligence (Computer security).

Classification: LCC TK5105.875.157 M575 2016 (print) | LCC TK5105.875.157 (ebook) | DDC 384.30973--dc23. LC record available at http://lccn.loc.gov/2016006180


Picture 1 TM The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences Permanence of Paper for Printed Library Materials, ANSI/NISO Z39.48-1992.


Printed in the United States of America

For Andrew, Benjamin and Joaquin.
May their futures be cyber-secure.


Foreword In October 2015 as the Senate prepared to take a historic step on - photo 2
Foreword

In October 2015, as the Senate prepared to take a historic step on cybersecurity, news broke that a teenager had hacked the private e-mail account of the Central Intelligence Agencys director. Like many Americans, John Brennan stored a collection of sensitive documents in his e-mail account that provided a virtual users guide to his personal life as well as sensitive government documents. The hacker revealed his actions, though not his identity, to the New York Post, which broke the story.

The hacker said he used a tactic called social engineering that involved tricking workers at Verizon into providing Brennans personal information and duping AOL into resetting his password, the paper reported. The hacker said he got into Homeland Security Secretary Jeh Johnsons Comcast account as well.

Anyone and everyone is at risk in cyberspace. The risk rises exponentially if you use common passwords across sites and services. Cyber crooks and hackers employed by foreign intelligence services make fast work of passwords that use proper names, birth years, or other easily obtainable personal information. Once in, hackers can silently bleed funds from bank accounts or cause any number of personal headaches.

But thats the lower end of the cybersecurity threat facing the United States and the rest of the world. At the upper end, youll find the destruction of industrial control systems, fried computer networks, and disabled electric power grids. All of those types of cyber attacks have already taken place. Much worse could be in store.

The effort to secure cyberspace, by government and industry, remains in the embryonic stages.

Cybersecurity is about the vulnerability of the computers and cyber networks that run every aspect of life in the United States and other technology-based countries. Its about potential threats on a grand scale to the global economy.

The U.S. government defines cybersecurity as The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.

The extended definition puts it fully in a policy context:

Strategy, policy, and standards regarding the security of and operations in cyberspace, and encompass[ing] the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as they relate to the security and stability of the global information and communications infrastructure.

The federal government identifies sixteen critical infrastructure sectors within the U.S. economy. Each one touches every American in some way. The information technology sector, the telecommunications industry, the financial sector, and gas and electric utilities are obvious targets for cyber attacks and cyber theft. But each of the other critical infrastructure sectorstransportation, water works, chemical facilities, the healthcare system, seaports, nuclear power plants, the emergency services system, the so-called defense industrial base and even smart buildings, dams, and agriculturehas its own vulnerabilities in cyberspace.

As the first decade of the twenty-first century ended and the second decade began, the political class was beginning to get it. But political leaders and government policymakers had barely scratched the surface on any of the policy elements described above.

Cyber is deeply ingrained in virtually every facet of our lives, Rep. Mac Thornberry of Texas said in 2011, after chairing a congressional Republican task force on the subject. We are very dependent upon it, which means that we are very vulnerable to disruptions and attacks. Cyber threats pose a significant risk to our national security as well as to our economy and jobs.

Thornberry pointed to the policy rub: At least 85 percent of what must be protected is owned and operated by the private sector. Government must tread carefully in this area or risk damaging one of our greatest strengthsdynamic, innovate companies and businesses that are the key to our economy and to cybersecurity advances.

But tread it must. Republican and Democratic politicians alike were realizing that cybersecurity was an issue that couldnt be avoided, and that sculpting answers would be an arduous and frequently thankless task.

A glance at the statistics told the story.

The FBIs Internet Crime Complaint Center received 269,422 complaints in 2014. Those cyber crimes came with a price tag of over $800 million. Social media platforms were an increasingly popular entry point for crooks, according to the bureau.

Every stolen electronic record carried an average cost of $154, IBM and the Ponemon Institute declared in the tenth annual Cost of Data Breach Study released in 2015. Millions upon millions of records were being stolen at lightning speed. Do the math, and the potential economic cost shoots way over FBI estimates based on formal complaints. PricewaterhouseCoopers did the math in 2015 and found 1 billion compromised records.

And that was just the garden-variety criminal side of the cybersecurity equation. The Department of Homeland Securitys center for monitoring computer networks for cyber attacks would record 350,000 attacks or intrusions in a six-month period between October 2013 and May 2014. That was 120,000 more incidents than in the entire previous twelve-month period. Intruders remained on infected systems for months or even years.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hacked: the inside story of Americas struggle to secure cyberspace»

Look at similar books to Hacked: the inside story of Americas struggle to secure cyberspace. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hacked: the inside story of Americas struggle to secure cyberspace»

Discussion, reviews of the book Hacked: the inside story of Americas struggle to secure cyberspace and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.