41,75 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this [...] will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.
Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book¿s expert insights and be prepared for the future of cybersecurity.
Who This Book Is For
Those interested in understanding what cybersecurity is all about, the failures have taken place in the field to date, and how they could have been avoided. For existing leadership and management in enterprises and government organizations, existing professionals in the field, and for those who are considering entering the field, this book covers everything from how to create a culture of security to the technologies and processes you can employ to achieve security based on lessons that can be learned from past breaches.
In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this [...] will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.
Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book¿s expert insights and be prepared for the future of cybersecurity.
Who This Book Is For
Those interested in understanding what cybersecurity is all about, the failures have taken place in the field to date, and how they could have been avoided. For existing leadership and management in enterprises and government organizations, existing professionals in the field, and for those who are considering entering the field, this book covers everything from how to create a culture of security to the technologies and processes you can employ to achieve security based on lessons that can be learned from past breaches.
Part I: The Biggest Breaches
The goal of this part is to explain, in plain English, the biggest breaches in recent years, focusing on what has resulted in everything from exposure of the majority of American consumers' financial identities to a foreign power more than significantly "influencing" the election of our most recent President. The breaches will be covered in reverse chronological order of the years in which the breaches were made public (even though some of them occurred prior), and in the summary section, I'll also comment on the relevance and implications of the actual years in which the breaches took place.
Chapter 1: The Five Key Root Causes
This chapter reviews the five basic root causes that we'll see in all the mega-breaches that will be reviewed in subsequent chapters.
- Phishing
- Malware
- Third-party compromise (suppliers, customers, and partners, as well as acquisitions)
- Software Vulnerabilities (application security as well as third-party vulnerabilities)
- Inadvertent employee mistakes
Chapter 2: The Capital One Breach in 2019
On July 29, 2019, court documents were released regarding a security breach at Capital One that exposed data for over 105 million people. A lone hacker gained access to highly sensitive data including names, social security numbers, addresses, and dates of birth. This hack is just one example in which over a hundred million customer records have been exposed to the entire Internet.
- The Modern Day Datacenter: The Cloud and Hybrid Clouds
- Erratic: Former Amazon Web Services employee
- The Firewall Hack
- The Ex-Filtration
- The Simple Mistakes
- The Charges & The Fallout
Chapter 3: Cambridge Analytica & Facebook
The goal of this chapter is to cover two issues that both involved Facebook. The first issue is how Cambridge Analytica, a data analytics firm that assisted President Trump's presidential campaign, abused Facebook to harvest data on 70 million U.S. consumers to create psychographic profiles of them and target ads to influence voting. The second issue is how a vulnerability in Facebook's "View As" feature (that allows users to see how their profiles look to the public) was exploited to allow for the take over of approximately 50 million Facebook accounts. The sections in this chapter will also set the groundwork for the Facebook hacking of the 2016 election by the Russians.
- How Facebook Works
- How Facebook Makes Money Through Ads
- Political Ads
- Security Challenges with Ads: Abusive Targeting, Bad Ads, Malvertising, and Click Fraud
- Facebook's Third-Party Apps and APIs
- Cambridge Analytica Harvesting
- Bungled Remediation of Harvested Data
- The "View As..." Vulnerability
- Remediation of the "View As..." Vulnerability
Chapter 4: The Marriott Hack in 2018
The Marriott hack disclosed in 2018 has been the second largest breach of all time as it involved 383 million records, and is only second to Yahoo's hack of 3 billion email accounts which we'll describe in see Chapter 8. Passport numbers, and the location history of hundreds of millions of people was amongst the data stolen in the breach. Combined with stolen data from the US Government's Office of Personnel Management breach (described in Chapter 7), one can even derive the location histories or potentially even impersonate some CIA agents and spies.
- Marriott and Starwood
- DBA Account Takeover
- Malware: Remote Access Trojan and Mimikatz
- Starwood Guest Reservation Database Exfiltration
Chapter 5: The Equifax Hack in 2017
The credit histories of 145M+ American consumers were stolen in 2017 in the largest breach of financial identity in history.
- Vulnerability Management Problems
- Apache Struts and CVE-2017-5638
- The Overall State of Information Security at Equifax
- The Hack
- The Blundered Response
- The Impact
Chapter 6: The Facebook Hack in the 2016 Presidential Election
This chapter describes the organized Russian disinformation campaign in which Facebook was weaponized to distribute over 5 million paid ads that focused on dividing the American public and influencing votes in the 2016 Presidential election.
- Dezinformatsiya: Inherently Russian
- Lack of Regulatory Oversight for Social Media (as compared to TV advertising)
- Russian Facebook Ads
- The Internet Research Agency: Kremlin-backed Online Troll Farm (amongst 228 groups) Weaponization of Ad Targeting: Swing States (Pennsylvania, Virginia, and Wisconsin)
- Suspicious Advertisers: Over 9,500
- Fancy Bear: Indictments of 13 Russian Individuals
Chapter 7: The Democratic National Committee Hack in 2016
Just as significant as the disinformation advertising campaign was the infiltration and subsequent leaks of over 150,000 emails from the Democratic National Committee.
- Trump's Request
- Massive Phishing Campaign
- How John Podesta Got Phished: 60,000 Emails Stolen
- Additional Phishing Emails: 150,000 Emails Stolen
- Guccifer 2.0
- WikiLeaks
- Key Emails and Information Leaked
- Impact
Chapter 8: The Office of Personnel Management Hack in 2015
The SF-86 background check files of over 20 million government employees (including CIA, NSA, FBI, and other agents) which also included information about their friends, family, and neighbors, as well as over 5 million fingerprints were stolen and exfiltrated by a foreing nation state.
- What was stolen
- Impact
- Root causes
- How it could have been prevented
Chapter 9: The Yahoo Hack in 2013 and 2014 (made public in 2016)
The largest breach in the history of the Internet and the world occured in 2013 and 2014 when attackers compromised Yahoo's email and other systems.
- Spear phishing
- Malware to grow footprint
- Cookie minting
- Yahoo Account Management Tool Compromise
- Targeting of Politicians and Diplomats
- Financial Impact and Verizon Acquisition
- Former KGB Agents and Indictments
Chapter 10: Holistic Implications
- Political Impact
- Financial Impact
- Regulatory Impact
- Technology Impact
Part II: How to Recover
For each of the root causes of breaches, we'll suggest countermeasures for each going forward. Phishing attacks can be successfully combated with better preventative countermeasures. Malware can unfortunately only be detected better, as no one can altogether stop adversaries from authoring malicious software. Existing software vulnerabilities also cannot be prevented, but their detection, containment, and recovery can be managed much more reliably or automated. Vulnerabilities in new applications, as well as other types of software, can be prevented through the introduction of building codes for software, as well as tools to support the development of software that meets those building codes. Finally, vulnerabilities in third-party suppliers can be recursively managed using the approaches that we've outlined here.
In this second part of the book, technologies that are critical to the roadmap to recovery are explained in plain English. In addition, the contributions that people in various roles need to make and the processes that need to be put in place by those people will also be covered.
Chapter 11: Better Preventative Countermeasures
- Password Managers, Multi-factor Authentication, and Yubico-like Hardware Tokens
- Authentication Providers (Current as well as potential future e.g. FIDO Alliance)
- Automated Patching: Endpoints, Servers, and IoT. Browsers (e.g., Chrome) are a great example of how this can be done right. Mac OS X updates are also a great example, even if a bit inconvenient sometimes. Servers and IoT need help. Mirai botnet from 2016 exhibits the urgency. IoT Guidelines.
- Building Codes for Software
Chapter 12: Detection: Identity Monitoring
- Difference between credit monitoring and identity monitoring
- Dark Web Monitoring
- New Account Creation Vs. Account Takeover
Chapter 13: Detection: Bad Ads, Fake News, and Anti-Malvertising
The goal of this chapter is to focus on detection of bad ads, fake news, and malware that attempt to enter and distribute itself through the online advertising ecosystem.
Chapter 14: Containment and Recovery: How to Make the Stolen Data Useless
For any and all information that has been stolen to date, we should attempt to make the stolen data useless. While that can't be done for all data, and time will be required for some data (perhaps even a generation or two) to become fully obsolete, as in the case of stolen background information, it is will worth the effort to render certain data to be ineffective. For instance, SSNs are currently treated as secrets and are used for authentication of users. However, since most of the SSNs in the country have been stolen, they should not be treated as secrets, and alternative methods for actual authentication should be used. SSNs can still be used as identifiers, but knowledge of someone's SSN should not allow you to transact as then. A similar argument can be made for the typical questions asked in KBA (knowledge based answer)...
Erscheinungsjahr: | 2021 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xlvii
427 S. 41 s/w Illustr. 427 p. 41 illus. |
ISBN-13: | 9781484266540 |
ISBN-10: | 1484266544 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Elbayadi, Moudy
Daswani, Neil |
Auflage: | 1st ed. |
Hersteller: |
Apress
Apress L.P. |
Maße: | 235 x 155 x 26 mm |
Von/Mit: | Moudy Elbayadi (u. a.) |
Erscheinungsdatum: | 25.02.2021 |
Gewicht: | 0,715 kg |
Part I: The Biggest Breaches
The goal of this part is to explain, in plain English, the biggest breaches in recent years, focusing on what has resulted in everything from exposure of the majority of American consumers' financial identities to a foreign power more than significantly "influencing" the election of our most recent President. The breaches will be covered in reverse chronological order of the years in which the breaches were made public (even though some of them occurred prior), and in the summary section, I'll also comment on the relevance and implications of the actual years in which the breaches took place.
Chapter 1: The Five Key Root Causes
This chapter reviews the five basic root causes that we'll see in all the mega-breaches that will be reviewed in subsequent chapters.
- Phishing
- Malware
- Third-party compromise (suppliers, customers, and partners, as well as acquisitions)
- Software Vulnerabilities (application security as well as third-party vulnerabilities)
- Inadvertent employee mistakes
Chapter 2: The Capital One Breach in 2019
On July 29, 2019, court documents were released regarding a security breach at Capital One that exposed data for over 105 million people. A lone hacker gained access to highly sensitive data including names, social security numbers, addresses, and dates of birth. This hack is just one example in which over a hundred million customer records have been exposed to the entire Internet.
- The Modern Day Datacenter: The Cloud and Hybrid Clouds
- Erratic: Former Amazon Web Services employee
- The Firewall Hack
- The Ex-Filtration
- The Simple Mistakes
- The Charges & The Fallout
Chapter 3: Cambridge Analytica & Facebook
The goal of this chapter is to cover two issues that both involved Facebook. The first issue is how Cambridge Analytica, a data analytics firm that assisted President Trump's presidential campaign, abused Facebook to harvest data on 70 million U.S. consumers to create psychographic profiles of them and target ads to influence voting. The second issue is how a vulnerability in Facebook's "View As" feature (that allows users to see how their profiles look to the public) was exploited to allow for the take over of approximately 50 million Facebook accounts. The sections in this chapter will also set the groundwork for the Facebook hacking of the 2016 election by the Russians.
- How Facebook Works
- How Facebook Makes Money Through Ads
- Political Ads
- Security Challenges with Ads: Abusive Targeting, Bad Ads, Malvertising, and Click Fraud
- Facebook's Third-Party Apps and APIs
- Cambridge Analytica Harvesting
- Bungled Remediation of Harvested Data
- The "View As..." Vulnerability
- Remediation of the "View As..." Vulnerability
Chapter 4: The Marriott Hack in 2018
The Marriott hack disclosed in 2018 has been the second largest breach of all time as it involved 383 million records, and is only second to Yahoo's hack of 3 billion email accounts which we'll describe in see Chapter 8. Passport numbers, and the location history of hundreds of millions of people was amongst the data stolen in the breach. Combined with stolen data from the US Government's Office of Personnel Management breach (described in Chapter 7), one can even derive the location histories or potentially even impersonate some CIA agents and spies.
- Marriott and Starwood
- DBA Account Takeover
- Malware: Remote Access Trojan and Mimikatz
- Starwood Guest Reservation Database Exfiltration
Chapter 5: The Equifax Hack in 2017
The credit histories of 145M+ American consumers were stolen in 2017 in the largest breach of financial identity in history.
- Vulnerability Management Problems
- Apache Struts and CVE-2017-5638
- The Overall State of Information Security at Equifax
- The Hack
- The Blundered Response
- The Impact
Chapter 6: The Facebook Hack in the 2016 Presidential Election
This chapter describes the organized Russian disinformation campaign in which Facebook was weaponized to distribute over 5 million paid ads that focused on dividing the American public and influencing votes in the 2016 Presidential election.
- Dezinformatsiya: Inherently Russian
- Lack of Regulatory Oversight for Social Media (as compared to TV advertising)
- Russian Facebook Ads
- The Internet Research Agency: Kremlin-backed Online Troll Farm (amongst 228 groups) Weaponization of Ad Targeting: Swing States (Pennsylvania, Virginia, and Wisconsin)
- Suspicious Advertisers: Over 9,500
- Fancy Bear: Indictments of 13 Russian Individuals
Chapter 7: The Democratic National Committee Hack in 2016
Just as significant as the disinformation advertising campaign was the infiltration and subsequent leaks of over 150,000 emails from the Democratic National Committee.
- Trump's Request
- Massive Phishing Campaign
- How John Podesta Got Phished: 60,000 Emails Stolen
- Additional Phishing Emails: 150,000 Emails Stolen
- Guccifer 2.0
- WikiLeaks
- Key Emails and Information Leaked
- Impact
Chapter 8: The Office of Personnel Management Hack in 2015
The SF-86 background check files of over 20 million government employees (including CIA, NSA, FBI, and other agents) which also included information about their friends, family, and neighbors, as well as over 5 million fingerprints were stolen and exfiltrated by a foreing nation state.
- What was stolen
- Impact
- Root causes
- How it could have been prevented
Chapter 9: The Yahoo Hack in 2013 and 2014 (made public in 2016)
The largest breach in the history of the Internet and the world occured in 2013 and 2014 when attackers compromised Yahoo's email and other systems.
- Spear phishing
- Malware to grow footprint
- Cookie minting
- Yahoo Account Management Tool Compromise
- Targeting of Politicians and Diplomats
- Financial Impact and Verizon Acquisition
- Former KGB Agents and Indictments
Chapter 10: Holistic Implications
- Political Impact
- Financial Impact
- Regulatory Impact
- Technology Impact
Part II: How to Recover
For each of the root causes of breaches, we'll suggest countermeasures for each going forward. Phishing attacks can be successfully combated with better preventative countermeasures. Malware can unfortunately only be detected better, as no one can altogether stop adversaries from authoring malicious software. Existing software vulnerabilities also cannot be prevented, but their detection, containment, and recovery can be managed much more reliably or automated. Vulnerabilities in new applications, as well as other types of software, can be prevented through the introduction of building codes for software, as well as tools to support the development of software that meets those building codes. Finally, vulnerabilities in third-party suppliers can be recursively managed using the approaches that we've outlined here.
In this second part of the book, technologies that are critical to the roadmap to recovery are explained in plain English. In addition, the contributions that people in various roles need to make and the processes that need to be put in place by those people will also be covered.
Chapter 11: Better Preventative Countermeasures
- Password Managers, Multi-factor Authentication, and Yubico-like Hardware Tokens
- Authentication Providers (Current as well as potential future e.g. FIDO Alliance)
- Automated Patching: Endpoints, Servers, and IoT. Browsers (e.g., Chrome) are a great example of how this can be done right. Mac OS X updates are also a great example, even if a bit inconvenient sometimes. Servers and IoT need help. Mirai botnet from 2016 exhibits the urgency. IoT Guidelines.
- Building Codes for Software
Chapter 12: Detection: Identity Monitoring
- Difference between credit monitoring and identity monitoring
- Dark Web Monitoring
- New Account Creation Vs. Account Takeover
Chapter 13: Detection: Bad Ads, Fake News, and Anti-Malvertising
The goal of this chapter is to focus on detection of bad ads, fake news, and malware that attempt to enter and distribute itself through the online advertising ecosystem.
Chapter 14: Containment and Recovery: How to Make the Stolen Data Useless
For any and all information that has been stolen to date, we should attempt to make the stolen data useless. While that can't be done for all data, and time will be required for some data (perhaps even a generation or two) to become fully obsolete, as in the case of stolen background information, it is will worth the effort to render certain data to be ineffective. For instance, SSNs are currently treated as secrets and are used for authentication of users. However, since most of the SSNs in the country have been stolen, they should not be treated as secrets, and alternative methods for actual authentication should be used. SSNs can still be used as identifiers, but knowledge of someone's SSN should not allow you to transact as then. A similar argument can be made for the typical questions asked in KBA (knowledge based answer)...
Erscheinungsjahr: | 2021 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xlvii
427 S. 41 s/w Illustr. 427 p. 41 illus. |
ISBN-13: | 9781484266540 |
ISBN-10: | 1484266544 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Elbayadi, Moudy
Daswani, Neil |
Auflage: | 1st ed. |
Hersteller: |
Apress
Apress L.P. |
Maße: | 235 x 155 x 26 mm |
Von/Mit: | Moudy Elbayadi (u. a.) |
Erscheinungsdatum: | 25.02.2021 |
Gewicht: | 0,715 kg |