ebook img

Security and the Networked Society PDF

309 Pages·2013·4.639 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security and the Networked Society

Mark A. Gregory · David Glance Security and the Networked Society Security and the Networked Society Mark A. Gregory (cid:129) David Glance Security and the Networked Society Foreword by Margaret Gardner AO and Robyn Owens Mark A. Gregory David Glance RMIT University University of Western Australia Melbourne , VIC , Australia Crawley , WA , Australia ISBN 978-3-319-02389-2 ISBN 978-3-319-02390-8 (eBook) DOI 10.1007/978-3-319-02390-8 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2013951227 © Springer International Publishing Switzerland 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifi cally for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) A special thank you to Susan Lagerstrom-Fife at Springer who supported this book from the outset. The authors would like to thank The Conversation ( h ttp://www.theconversation. edu.au ) and Technology Spectator ( http://www.technologyspectator.com.au ) . Special thanks goes to the editors who assisted with the preparation of the material included in this book: From The Conversation Andrew Jaspan, Misha Ketchell, Helen Westerman, Matt De Neef, Paul Dalgarno, Bella Counihan, Gillian Terzis and Charis Palmer and from Technology Spectator Supratim Adhikari and Harrison Polites. Thanks also to our universities RMIT University and University of Western Australia for supporting The Conversation and enabling us to develop our writing and ideas. Foreword The digital era has brought the world, in all its variety and constant change, closer to us, as physical boundaries become less important. We benefi t from the multiple connections and the speed with which we can make them. We struggle with the way this changes fundamentally so many aspects of our lives. This collection of articles about the impacts—positive and negative—that these advances in digital technologies are having on our lives had its origins in The Conversation. The Conversation, of which RMIT University is a Strategic Partner, provides a means by which academics and researchers can provide their views and expertise direct to the public. It allows faster and broader communication of the ideas and assessments of researchers. It is shaping public debate and discourse and hopefully deepening our public conversations. This collection of material from The Conversation is a thoughtful consideration of where such technologies may take us in the future. And it is itself a demonstra- tion of how far such technologies have taken us already. Professor Margaret Gardner AO Vice-Chancellor and President RMIT University The use of technology has always been a driving force in the growth and development of humanity. Although it is now easy to see the general pervasiveness of digital technologies and their overall impact within various societies around the world, we can now capture the exact points in time when new technologies are created and how they develop as they come into contact and are modifi ed by their users. As a result of this, our understanding of the signifi cance of sentinel events in the story of technology and society in recent years has been better than for any other time in history. This collection of articles synthesizes the detail and signifi cance of the important infl exions in the growth of social networks, smartphone use, cybercrime, vii viii Foreword hacking, and cyber security. For anyone making sense of how governments and societies fi rst experienced the collective hacktivism of Anonymous, for example, the articles in this book capture stories of their rise into, and from, prominence. Since fi rst being published, the articles presented in this book have been viewed collectively about 300,000 times and have provoked wide-ranging discussion amongst their readers. Taken collectively, they form an extremely valuable resource for those wanting to understand where technology is likely to take us in the future. Professor Robyn Owens Deputy Vice-Chancellor (Research) The University of Western Australia Contents 1 Introduction ............................................................................................... 1 2 Hacking ...................................................................................................... 3 2.1 Hacking, Cracking and the Wild, Wild Web ...................................... 3 2.1.1 Who’s Hacking Who? ............................................................. 5 2.1.2 The Wild, Wild Web ............................................................... 5 2.1.3 Colour-Coded Hacking ........................................................... 5 2.1.4 Crackers .................................................................................. 6 2.1.5 Hack Attacks .......................................................................... 6 2.1.6 Stuxnet .................................................................................... 6 2.2 Anonymous, Child Porn and the Wild, Wild Web ............................. 7 2.3 Fear and Loathing in Las Vegas: Tipping a Black Hat to the DefCon Hackers ................................................................ 9 2.3.1 DefCon ................................................................................... 10 2.3.2 Government Hackers .............................................................. 11 2.4 Are Anonymous Hackers Really on Trial, or Is FBI Payback Misdirected? ........................................................................ 12 2.4.1 Payback ................................................................................... 13 2.4.2 DDoS ...................................................................................... 14 2.4.3 Kicking an Open Door ............................................................ 15 2.5 Comodo Hacker, TurkGuvenligi…Out for Lulz or Breaking the Internet? ................................................................... 16 2.5.1 Comodo Hacker Breaks SSL .................................................. 16 2.5.2 Comodo Hacker Reprised ....................................................... 17 2.5.3 TurkGuvenligi Breaks DNS ................................................... 18 2.5.4 The Internet Is Broken ............................................................ 18 2.5.5 Solutions to Fix the Internet? ................................................. 19 2.6 Betrayed? LulzSec Arrest Over Sony Hack Reveals Trust Issues ........................................................................................ 20 2.6.1 Betrayal ................................................................................... 20 2.6.2 Just Business, Right? .............................................................. 21 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.