• Complain

Clarke Richard Alan - The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats

Here you can read online Clarke Richard Alan - The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: United States, year: 2019, publisher: Penguin Random House LLC;Penguin Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Clarke Richard Alan The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
  • Book:
    The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
  • Author:
  • Publisher:
    Penguin Random House LLC;Penguin Press
  • Genre:
  • Year:
    2019
  • City:
    United States
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

There is much to fear in the dark corners of cyberspace. From well-covered stories like the Stuxnet attack which helped slow Irans nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that closed hospitals in Britain and froze shipping crates in Germany in midair, we have entered an age in which online threats carry real-world consequences. But we do not have to let autocrats and criminals run amok in the digital realm. We now know a great deal about how to make cyberspace far less dangerous--and about how to defend our security, economy, democracy, and privacy from cyber attack. This is a book about the realm in which nobody should ever want to fight a war: the fifth domain, the Pentagons term for cyberspace. Our guides are two of Americas top cybersecurity experts, seasoned practitioners who are as familiar with the White House Situation Room as they are with Fortune 500 boardrooms. Richard A. Clarke and Robert K. Knake offer a vivid, engrossing tour of the often unfamiliar terrain of cyberspace, introducing us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can fend off cyber threats. Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the U.S. intelligence community with officials working to defend Americas elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for cyber resilience--building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding the trap of overreaction to digital attacks. Above all, Clarke and Knake show us how to keep the fifth domain a humming engine of economic growth and human progress by not giving in to those who would turn it into a wasteland of conflict. Backed by decades of high-level experience in the White House and the private sector, The Fifth Domain delivers a riveting, agenda-setting insider look at what works in the struggle to avoid cyberwar.--Dust jacket.;The back of the Beast -- EternalBlue, eternal war -- Two kinds of companies? -- The kill chain -- The tech stack -- Cyber resilience : the best bad idea weve got -- Nudges and shoves -- Is it really you? -- Fixing the people problem -- Power grids and power plays -- Securing the Feds -- The military, domains, and dominance -- A Schengen accord for the internet -- Democracys shield -- Real and artificial intelligence -- A quantum of solace for security -- 5G and IoT -- Derisking ourselves -- Everything done but the coding.;Presents an urgent assessment of how governments, businesses, and everyday citizens can counter and prevent attacks by criminal hackers determined to create a digital war zone.

Clarke Richard Alan: author's other books


Who wrote The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats? Find out the surname, the name of the author of the book and a list of all author's works by series.

The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
PENGUIN PRESS An imprint of Penguin Random House LLC penguinrandomhousecom - photo 1
PENGUIN PRESS An imprint of Penguin Random House LLC penguinrandomhousecom - photo 2

PENGUIN PRESS

An imprint of Penguin Random House LLC

penguinrandomhouse.com

Copyright 2019 by Richard A. Clarke and Robert K. Knake

Penguin supports copyright. Copyright fuels creativity, encourages diverse voices, promotes free speech, and creates a vibrant culture. Thank you for buying an authorized edition of this book and for complying with copyright laws by not reproducing, scanning, or distributing any part of it in any form without permission. You are supporting writers and allowing Penguin to continue to publish books for every reader.

Library of Congress Cataloging-in-Publication Data

Names: Clarke, Richard A. (Richard Alan), 1951 author. | Knake, Robert K., author.

Title: The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats / Richard A. Clarke and Robert K. Knake.

Description: New York: Penguin Press, 2019. | Includes bibliographical references and index.

Identifiers: LCCN 2019012065 (print) | LCCN 2019016384 (ebook) | ISBN 9780525561972 (ebook) | ISBN 9780525561965 (hardcover)

Subjects: LCSH: CyberterrorismUnited States. | Computer securityUnited States. | Computer networksSecurity measuresUnited States. | CorporationsSecurity measuresUnited States. | National securityUnited States.

Classification: LCC HV6773.2 (ebook) | LCC HV6773.2 .C585 2019 (print) | DDC 363.325dc23

LC record available at https://lccn.loc.gov/2019012065

While the authors have made every effort to provide accurate internet addresses and other contact information at the time of publication, neither the publisher nor the authors assume any responsibility for errors or for changes that occur after publication. Further, the publisher does not have any control over and does not assume any responsibility for author or third-party websites or their content.

Version_1

To the late Michael A. Sheehan:

Soldier, Diplomat, Patriot, Iconoclast, Friend

RICHARD A. CLARKE

To my son, William, whose deep interest in the causes of war is driven by his even deeper desire for peace.

ROBERT K. KNAKE

Contents
PART I
THE TWENTY-YEAR WAR
Chapter 1
THE BACK OF THE BEAST

The future is already here; its just not very evenly distributed.

WILLIAM GIBSON

Sitting in the back of the Beast, the armored vehicle custom made for the President of the United States, Bill Clinton wanted to talk about his cousin from Hope, Arkansas. He didnt want to talk about the major speech he was about to give at the National Academy of Sciences. It was January 1999, and Clinton had just proposed budget initiatives to combat emerging threats, including those in the cyber domain. Few people then saw cyber threats as a major problem. But he did. Dick Clarke sat next to him with a PowerPoint deck and an annotated version of the speech, but the President was channeling his Bubba persona, telling a story about Arkansas, and not to be stopped.

When the Beast pulled into the underground parking at the academy, Clinton finally turned to the business at hand. I read the speech. Its okay. That meant it wasnt.

But really, isnt what we want to say something like this: Throughout history there is a competition between offensive and defensive technologies and a gap between their development. A guy in a cave carves a rock and attaches it to a stick and creates a spear, and then someone needs to defend against that, so they get some animal hides and make a shield. Later on, people defend towns with walls and then some guy invents battering rams and catapults. But there is time between when an offensive weapon is created and when the defensive counter to it comes along. A Secret Service agent standing next to the vehicle opened the heavy door of the Beast. You cannot really open it from inside.

The President kept going, warming to his theme. And right now, the problem is that the new offensive technologies have taken to the field and they now have the advantage over the things that we have to defend against them. So, what we have to do is invest in new technologies that will give the defense the advantage again, or at least even out the playing field. Have I got it right?

Clarke looked at the President, bemused, reminded again about the preternatural ability he had to make the complex comprehensible. Clarke put away his copy of the draft speech and the PowerPoint deck, sighed, and said, Yeah, Mr. President, you should say that today. And he did.

Nineteen years and three months later, Clinton said the same thing verbatim in answering a question about his cyber-oriented novel while sitting on stage in Washingtons Warner Theatre. It was still true. In the intervening twenty years, hundreds of billions of dollars in public and private investment in cybersecurity research, development, and deployment had not fundamentally changed the advantage. It remains a case of what military theorists call offensive advantage or offensive preference.

Offensive Preference in Cyberspace

Any scenario between adversaries is a balance between offense and defense. When the offense has the advantage because of some combination of technological superiority or cost, military theorists write, there will be conflict. When the reverse is true, when it costs more to attack, or when the chances of an attack defeating the defenses is low, greater stability will prevail. We think these generalities apply now to the ongoing hostilities between hackers and corporations, to the current covert espionage done by nation-states, and to the potential for a future nation-state-on-nation-state cyber war. Today, as for the last twenty-five years, the conventional wisdom in the fields of computer science, information technology, and networking is that there is an enormous offensive preference. That might not have been a big deal to most people, except that in the last twenty-five years, we have also made almost everything dependent upon computer networks. In fact, because the offense is thought to have the advantage right now, in a crisis situation of possible conventional warfare, there is likely to be an inclination to go first with a cyberattack.

This book is about how the balance between offense and defense is changing and how the rate of change can be increased to set us on the path to stability. We think it is possible to reduce the risks posed by offensive cyber technologies and actors, and to increase peacetime stability for corporations and crisis stability for nations.

As we write this in 2019, we see a pattern of malicious activity in cyberspace that suggests we are already engaged in a low-grade, simmering cyber conflict with Russia, China, and Iran. We also are beginning to turn a corner on this problem. Estimates put worldwide cybersecurity spending at $114 billion in 2018. Venture capital investment in cybersecurity technology is up, topping $5 billion in 2018 alone. More than three thousand new technology firms have sprung up, backed by ample venture capital, to develop new solutions. Cyber insurance was long a fringe product. Today, the market is (finally) growing and thriving, with almost $2 billion in premiums written in 2017.

Long-standing problems created by government, such as barriers to information sharing, have been solved and companies are actually beginning to organize communities not only to share information, but also to provide mutual aid during crises. One chief information security officer (CISO) at a major bank we spoke with thinks that in five years his bank will largely be immune to cyberattacks as it upgrades from legacy systems that are inherently insecure to systems that are secure by design. Many leaders in Silicon Valley, where optimism is never in short supply, would tend to agree.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats»

Look at similar books to The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats»

Discussion, reviews of the book The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.