• Complain

Arun Vishwanath - The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

Here you can read online Arun Vishwanath - The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: MIT Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing
  • Author:
  • Publisher:
    MIT Press
  • Genre:
  • Year:
    2022
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience.
Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity communitys response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishingan approach that doesnt rely on continual training and retraining but provides a way to diagnose user vulnerability.
Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees.
The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.

Arun Vishwanath: author's other books


Who wrote The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
List of Figures
Guide
Pagebreaks of the print version
THE WEAKEST LINK How to Diagnose Detect and Defend Users from Phishing - photo 1

THE WEAKEST LINK

How to Diagnose, Detect, and Defend Users from Phishing

ARUN VISHWANATH

The MIT Press

Cambridge, Massachusetts

London, England

2022 Massachusetts Institute of Technology

All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.

The MIT Press would like to thank the anonymous peer reviewers who provided comments on drafts of this book. The generous work of academic experts is essential for establishing the authority and quality of our publications. We acknowledge with gratitude the contributions of these otherwise uncredited readers.

Library of Congress Cataloging-in-Publication Data

Names: Vishwanath, Arun, author.

Title: The weakest link : how to diagnose, detect, and defend users from phishing / Arun Vishwanath.

Description: Cambridge, Massachusetts : The MIT Press, [2022] | Includes bibliographical references.

Identifiers: LCCN 2021060548 (print) | LCCN 2021060549 (ebook) | ISBN 9780262047494 (hardcover) | ISBN 9780262371964 (pdf) | ISBN 9780262371971 (epub)

Subjects: LCSH: Phishing. | Computer security. | Computer networksSecurity measures. | Computer crimesPrevention.

Classification: LCC HV6773.15.P45 V56 2022 (print) | LCC HV6773.15.P45 (ebook) | DDC 364.16/8dc23/eng/20220307

LC record available at https://lccn.loc.gov/2021060548

LC ebook record available at https://lccn.loc.gov/2021060549

d_r0

Contents

List of Figures

List of Table

Acknowledgments

This book is a culmination of a journey that began with a spear phishing attack my institution received more than a decade ago. It was a new form of attack for the time, different from the all-to-common Nigerian phishing email. The attack occurred when I was studying the psychology of technology use and testing different ways of framing messages to persuade users into using their devices optimally. It was this fortuitous timing that led me to recognize the potential of this new attack vector, to my overall body of research on user risk from phishing, and ultimately to this book.

The research journey that followed took years of trying and failing. Many helped along the way. Among them were numerous students who worked on my research. Some worked for course credit, others coauthored papers with me, still others served as subjects, volunteering their data. This book wouldnt have been possible without their contributions. There were also agencies and organizations that lent invaluable support. The National Science Foundation provided some of the initial funding. Other organizations allowed me to test my approach on their employees. They provided data and insights into the challenges they faced, which guided the development of the cyber risk assessment approach. I am thankful to each of them.

There are many others. Most notably, Bruce Schneier at the Harvard Kennedy School, who inspired and mentored me through the arduous book writing process, and Jeff Dean, my former editor at Harvard University Press, who was among the first to see the books potential. I am forever grateful to them. I am also thankful to the entire editorial team at the MIT Press, who stepped up and shepherded the book through the publication process. Others include Dr. Loo Seng Neo, formerly at the Singapore Ministry of Home Ministry (and the rest of the behavioral science research team headed by Dr. Majeed Khader), and Simon Pavitt, at the UK Ministry of Defence, who helped refine the cyber hygiene inventory. They, along with the community of national security and law enforcement professionals in the United States, the United Kingdom, Europe, and Australia, helped shape this book, and I am grateful to all of them.

My final, deepest gratitude is to my family. My wife, Leslie, and my children, Vera and Dean, patiently suffered through my years of research and writing. Without their support, the book wouldnt have happened. Without them, none of it would matter. Thank you!

INTRODUCTION

It was Monday, November 24, 2014. Employees logging into their computers were greeted by a locked screen, across which flashed a menacing image of a fiery red skull with long tentacles with the message Hacked by #GOP. Accompanying it were sounds of gunfire, a poorly worded warning alluding to the theft of all the companys internal data, and a deadline of 16 hours to comply with a demand. This was the beginning of a hostage situationone that would rewrite the rules of cyber warfare forever.

The company under siege was Sony Pictures Entertainment (SPE). A hacker group named GOP, short for Guardians of Peace, demanded the stoppage of The Interview, a Seth Rogen movie slated for release on Christmas Day that featured a comical plot to assassinate North Korean leader Kim Jong-un.

As harried SPE employees restarted their computers, the malware kept finding newer hosts, quickly leaping from computer to computer, jumping through networks and then through servers. Within an hour, the attack had infected all SPE computers in Los Angeles, then New York, and soon across all continents. Within a few more hours, everything digitalfiles, data, emails, messages, scripts, storyboards had been irretrievably lost.

Writing for Fortune magazine, Peter Elkind detailed the scale of the destruction: It erased everything stored on 3262 of the companys 6797 personal computers and 837 of its 1555 servers. To make sure nothing could be recovered, the attackers had even added a little extra poison: a special deleting algorithm that overwrote the data seven different ways. When this was done, the code capped each computers startup software, rendering the machines brain-dead.

Over the next few weeks, the hackers dumped batches of confidential files on publicly accessible file-sharing hubs. These included emails among SPEs leadership team, the salaries and social security numbers of 47,000 employees, passports and visas of various cast and crew members, unfinished and finished scripts of yet-to-be-released movies, and even information about SPEs corporate vendors, such as the salary data of over 30,000 employees of Deloitte, its accounting firm. In all, hackers stole and released over 100 terabytes of data.

By mid-December, the Federal Bureau of Investigation (FBI) had officially attributed the breach to North Korea. The overall cost for system cleanup and recovery would be a staggering $45 million. Thats without accounting for the firing of SPEs studio chief, Amy Pascal, and others in top management; the loss of revenue from the leaked movies and scripts; the class-action lawsuits from employees and vendors; and the months of embarrassment from the trove of confidential emails that revealed not just the insides of the movie business but also SPE executives antipathy toward President Barack Obama and various Hollywood stars and starlets.

But while the media were busy covering the salacious gossip, there was a critical question no one asked: how could a country like North Korea pull off such a major cyber breach? To put this in context, all of North Koreas 24 million inhabitants have access to just about 28 websites, and only 0.3 percent of its entire population7,200 peoplehave unrestricted web access. So how did this technologically unsophisticated nation push one of the worlds foremost technological corporations back to the precomputer age, where employees were now resorting to Post-It notes and bulletin boards for communication? The answer is spear phishinga virulent, internet-based social engineering attack that I had been tracking, researching, and warning about for almost a decade.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing»

Look at similar books to The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing»

Discussion, reviews of the book The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.