ebook img

The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War PDF

214 Pages·2016·5.38 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War

The Second Economy The Race for Trust, Treasure and Time in the Cybersecurity War ― Steve Grobman Allison Cerra ― Foreword by Christopher Young, Cybersecurity Executive The Second Economy The Race for Trust, Treasure and Time in the Cybersecurity War Steve Grobman Allison Cerra Foreword by Christopher Young, Cybersecurity Executive The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War Steve Grobman Allison Cerra Santa Clara, California, USA Plano, Texas, USA ISBN-13 (pbk): 978-1-4842-2228-7 ISBN-13 (electronic): 978-1-4842-2229-4 DOI 10.1007/978-1-4842-2229-4 Library of Congress Control Number: 2016955488 Copyright © 2016 by Intel Corp. This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Managing Director: Welmoed Spahr Lead Editor: Natalie Pao Technical Reviewer: Patty Hatter Editorial Board: Steve Anglin, Pramila Balan, Laura Berendson, Aaron Black, Louise Corrigan, Jonathan Gennick, Robert Hutchinson, Celestin Suresh John, Nikhil Karkal, James Markham, Susan McDermott, Matthew Moodie, Natalie Pao, Gwenan Spearing Coordinating Editor: Jessica Vakili Copy Editor: Lori Jacobs Compositor: SPi Global Indexer: SPi Global Artist: SPi Global Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail [email protected] , or visit w ww.springeronline.com . Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation. For information on translations, please e-mail [email protected] , or visit w ww.apress.com . Apress and friends of ED books may be purchased in bulk for academic, corporate, or promotional use. eBook versions and licenses are also available for most titles. For more information, reference our Special Bulk Sales–eBook Licensing web page at w ww.apress.com/bulk-sales . Any source code or other supplementary materials referenced by the author in this text are available to readers at www.apress.com . For detailed information about how to locate your book’s source code, go to www.apress.com/source-code/ . Readers can also access source code at SpringerLink in the Supplementary Material section for each chapter. Printed on acid-free paper Contents at a Glance About the Authors .............................................................................ix About the Technical Reviewer ..........................................................xi Acknowledgements ........................................................................xiii Foreword .........................................................................................xv Prologue .........................................................................................xix ■ Part I: A Second Bite at the Problem .............................. 1 ■ Chapter 1: The Second Side of the Story ........................................3 ■ Chapter 2: The Second Nature of Markets ....................................21 ■ Chapter 3: Seconding the Cause ...................................................41 ■ Chapter 4: No Second Chance ......................................................59 ■ Chapter 5: Second-Guessing the Obvious .....................................77 ■ Part II: A Second Look at Conventional Wisdom ........... 95 ■ Chapter 6: Playing Second Fiddle .................................................97 ■ Chapter 7: Take a Second Look ..................................................115 ■ Chapter 8: When Seconds Matter ...............................................135 ■ Chapter 9: Second to None .........................................................155 ■ Chapter 10: Cybersecurity’s Second Wind ..................................175 ■ Epilogue ......................................................................................191 Index ..............................................................................................197 iii Contents About the Authors .............................................................................ix About the Technical Reviewer ..........................................................xi Acknowledgements ........................................................................xiii Foreword .........................................................................................xv Prologue .........................................................................................xix ■ Part I: A Second Bite at the Problem ......................................1 ■ Chapter 1: The Second Side of the Story ........................................3 The Cryptowars .......................................................................................4 Follow the Silk Road ................................................................................6 “You Must Be Punished” .........................................................................7 Enemy Within the Gates ..........................................................................9 Gone Phishing .......................................................................................10 A State of Emergency ............................................................................11 A Second Thought .................................................................................12 Notes .....................................................................................................14 ■ Chapter 2: The Second Nature of Markets ....................................21 Making It Up in Volume ..........................................................................23 Without a Trace ......................................................................................24 Follow the Money Trail ..........................................................................25 Tick Tock ................................................................................................27 v ■ CONTENTS Rise of the Machines .............................................................................29 A Second Thought .................................................................................33 Notes .....................................................................................................35 ■ Chapter 3: Seconding the Cause ...................................................41 Déjà vu ..................................................................................................44 Leaking Secrets .....................................................................................47 A Legion Joins the Fight ........................................................................48 A Second Thought .................................................................................49 Notes .....................................................................................................54 ■ Chapter 4: No Second Chance ......................................................59 Somebody Crossed the Rubicon............................................................62 A Cyber Pearl Harbor .............................................................................65 Fun with a Dash of Smarts ....................................................................67 A Second Thought .................................................................................69 Notes .....................................................................................................72 ■ Chapter 5: Second-Guessing the Obvious .....................................77 Enough, Already! ...................................................................................79 Passing the Buck ...................................................................................83 The Long Game .....................................................................................85 A Second Thought .................................................................................87 Notes .....................................................................................................89 ■ Part II: A Second Look at Conventional Wisdom ........... 95 ■ Chapter 6: Playing Second Fiddle .................................................97 Initial Battle Lines Are Drawn ................................................................98 The Underestimated Troublemakers....................................................100 vi CONTENTS ■ The Domesticated Heroes ...................................................................102 A Second Thought ...............................................................................107 Notes ...................................................................................................111 ■ Chapter 7: Take a Second Look ..................................................115 Taking the Keep ...................................................................................117 Securing the Virtual Castle ..................................................................119 Erring on the Side of Caution ..............................................................122 Ignoring One’s Defenses .....................................................................124 A Second Thought ...............................................................................125 Notes ...................................................................................................130 ■ Chapter 8: When Seconds Matter ...............................................135 Losing the Race ...................................................................................138 The More Things Change . . . ...............................................................140 The Red Queen’s Head Start ...............................................................142 A Second Thought ...............................................................................146 Notes ...................................................................................................153 ■ Chapter 9: Second to None .........................................................155 Doing the Unthinkable .........................................................................157 Protecting One’s Advantage ................................................................158 Celebrating a Hollow Victory ...............................................................158 Facing the Dilemma ............................................................................160 Punishing the Free Rider .....................................................................161 Raising the Elevation ...........................................................................166 A Second Thought ...............................................................................167 Notes ...................................................................................................169 vii ■ CONTENTS ■ Chapter 10: Cybersecurity’s Second Wind ����������������������������������175 Raising the Noise ��������������������������������������������������������������������������������176 Obeying the Law ����������������������������������������������������������������������������������178 Running the Gauntlet ���������������������������������������������������������������������������181 A Second Thought �������������������������������������������������������������������������������183 Notes ���������������������������������������������������������������������������������������������������188 ■ Epilogue ��������������������������������������������������������������������������������������191 ■ Index �������������������������������������������������������������������������������������������197 viii About the Authors Steve Grobma n A self-proclaimed cybersecurity pragmatist, Steve Grobman (@stevegrobman) has spent over two decades in senior technical leadership positions related to the field of cybersecurity. He has the distinction of serving on both sides of the white hat fight: both in defending his company against adversaries and in building innovative cybersecurity defense technology to protect consumers and organizations around the world. An avid student and teacher of the trade, Grobman earned his bachelor’s degree in computer science from North Carolina State University, has published multiple technical papers and books, and holds 24 US and international patents in the fields of security, software, and computer architecture, with another roughly 20 patents pending. He regularly provides perspectives on the adversary, the evolving threatscape, and the measures organizations and consumers alike can take in protecting themselves to industry insiders, media, analysts, and customers the world over—all delivered in laymen’s terms that distill extraordinarily complex problems into actionable prescriptions. Allison Cerra (@acerra1) found her life’s calling at 18 years of age, when she fortuitously stumbled into a lifelong career of marketing complex technologies. A frustrated anthropologist at heart, Cerra enjoys understanding how the technologies around us are fundamentally altering the way we live, work, learn, and play. Whether in dissecting how broadband upends traditional economies, how technology influences and reflects company culture, or how virtual and physical worlds converge to create a new human psyche, Cerra has explored the intersection of technology and behavior in several books. In 2015, motivated by a desire to stand on the good side of a fight too important to lose, Cerra joined the ranks of cybersecurity professionals, where she currently marries her calling for marketing with a cause of educating unwitting participants in a virtual battle that is underestimated, if not ignored, by far too many. ix About the Technical Reviewer Patty Hatter (@pattyhatter) is guided by a fundamental philosophy centered on building connections across the information technology (IT) ecosystem. The multiplier effect of her collaborative approach means better outcomes by every measure. She has led all parts of the business, from sales and service to operations and IT. As a result, she intimately understands her customers. For more than two decades, she’s developed an authentic leadership style marked by clear communication and tackling challenges head-on. She often appears at industry events to share her uniquely qualified perspective as a chief information officer (CIO) and cybersecurity leader. Hatter’s advocacy of STEM education, mentoring of women, and full inclusion in technology amplifies the impact of her leadership on these critical industry issues. She also donates her free time to support children’s education and the arts, and currently is on the board for the Silicon Valley Education Foundation (SVEF). xi

Description:
In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected sy
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.