The Resource You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
Resource Information
The item You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Waubonsee Community College.This item is available to borrow from 1 library branch.
Resource Information
The item You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Waubonsee Community College.
This item is available to borrow from 1 library branch.
- Summary
- Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump-makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks-financial gain, espionage, and public humiliation of the victims-that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts
- Language
- eng
- Extent
- xv, 318 pages
- Note
- Source of cataloging data: WCP
- Contents
-
- Introduction
- Lessons from financially motivated cybercrimes
- Operation get rich or die trying : how the TJX breach set the stage for a decade of payment card conflict
- "What they aren't telling you is their rules are archaic" : the South Carolina Department of Revenue breach, IRS fraud & identity theft
- The most wanted cybercriminal in the world : gameover zeus, cryptolocker, and the rise of ransomware
- Lessons from cyber espionage
- Certificates gone rogue : the diginotar compromise and the fragile trust infrastructure of the online world
- No doubt to hack you, writed by uglygorilla : China's PLA unit 61398 and economic espionage
- "Decades in the making" : the office of personnel management breach and political espionage
- Lessons from online acts of vengeance
- Operation Stophaus : the Spamhaus denial-of-service attacks
- "An epic nightmare" : the Sony breach and ex-post mitigation
- Imperfect affair : Ashley Madison and the economics of embarrassment
- Who should safeguard our data? : shared responsibility and liability
- "Email the way it should be" : the role of application designers and software developers
- Reasonable security : the role of organizations in protecting their data and networks
- "Happy talk about good ideas" : the role of policy makers in defending computer systems
- Conclusion: it will take all of us
- Notes
- Bibliography
- Index
- Isbn
- 9780262038850
- Label
- You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches
- Title
- You'll see this message when it is too late
- Title remainder
- the legal and economic aftermath of cybersecurity breaches
- Statement of responsibility
- Josephine Wolff
- Language
- eng
- Summary
- Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump-makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks-financial gain, espionage, and public humiliation of the victims-that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts
- Cataloging source
- DLC
- http://library.link/vocab/creatorName
- Wolff, Josephine
- Dewey number
- 364.16/8
- Index
- index present
- LC call number
- HV6773
- LC item number
- .W655 2018
- Literary form
- non fiction
- Nature of contents
- bibliography
- Series statement
- Information policy series
- http://library.link/vocab/subjectName
- Computer crimes
- Label
- You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
- Note
- Source of cataloging data: WCP
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- Lessons from financially motivated cybercrimes -- Operation get rich or die trying : how the TJX breach set the stage for a decade of payment card conflict -- "What they aren't telling you is their rules are archaic" : the South Carolina Department of Revenue breach, IRS fraud & identity theft -- The most wanted cybercriminal in the world : gameover zeus, cryptolocker, and the rise of ransomware -- Lessons from cyber espionage -- Certificates gone rogue : the diginotar compromise and the fragile trust infrastructure of the online world -- No doubt to hack you, writed by uglygorilla : China's PLA unit 61398 and economic espionage -- "Decades in the making" : the office of personnel management breach and political espionage -- Lessons from online acts of vengeance -- Operation Stophaus : the Spamhaus denial-of-service attacks -- "An epic nightmare" : the Sony breach and ex-post mitigation -- Imperfect affair : Ashley Madison and the economics of embarrassment -- Who should safeguard our data? : shared responsibility and liability -- "Email the way it should be" : the role of application designers and software developers -- Reasonable security : the role of organizations in protecting their data and networks -- "Happy talk about good ideas" : the role of policy makers in defending computer systems -- Conclusion: it will take all of us -- Notes -- Bibliography -- Index
- Control code
- on1029793778
- Dimensions
- 24 cm.
- Extent
- xv, 318 pages
- Isbn
- 9780262038850
- Lccn
- 2018010219
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- System control number
- (OCoLC)1029793778
- Label
- You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
- Note
- Source of cataloging data: WCP
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Introduction -- Lessons from financially motivated cybercrimes -- Operation get rich or die trying : how the TJX breach set the stage for a decade of payment card conflict -- "What they aren't telling you is their rules are archaic" : the South Carolina Department of Revenue breach, IRS fraud & identity theft -- The most wanted cybercriminal in the world : gameover zeus, cryptolocker, and the rise of ransomware -- Lessons from cyber espionage -- Certificates gone rogue : the diginotar compromise and the fragile trust infrastructure of the online world -- No doubt to hack you, writed by uglygorilla : China's PLA unit 61398 and economic espionage -- "Decades in the making" : the office of personnel management breach and political espionage -- Lessons from online acts of vengeance -- Operation Stophaus : the Spamhaus denial-of-service attacks -- "An epic nightmare" : the Sony breach and ex-post mitigation -- Imperfect affair : Ashley Madison and the economics of embarrassment -- Who should safeguard our data? : shared responsibility and liability -- "Email the way it should be" : the role of application designers and software developers -- Reasonable security : the role of organizations in protecting their data and networks -- "Happy talk about good ideas" : the role of policy makers in defending computer systems -- Conclusion: it will take all of us -- Notes -- Bibliography -- Index
- Control code
- on1029793778
- Dimensions
- 24 cm.
- Extent
- xv, 318 pages
- Isbn
- 9780262038850
- Lccn
- 2018010219
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- System control number
- (OCoLC)1029793778
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.waubonsee.edu/portal/Youll-see-this-message-when-it-is-too-late--the/yJKcUM7ozag/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.waubonsee.edu/portal/Youll-see-this-message-when-it-is-too-late--the/yJKcUM7ozag/">You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.waubonsee.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.waubonsee.edu/">Waubonsee Community College</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.waubonsee.edu/portal/Youll-see-this-message-when-it-is-too-late--the/yJKcUM7ozag/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.waubonsee.edu/portal/Youll-see-this-message-when-it-is-too-late--the/yJKcUM7ozag/">You'll see this message when it is too late : the legal and economic aftermath of cybersecurity breaches, Josephine Wolff</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.waubonsee.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.waubonsee.edu/">Waubonsee Community College</a></span></span></span></span></div>