Phil Quade - The Digital Big Bang

Здесь есть возможность читать онлайн «Phil Quade - The Digital Big Bang» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Digital Big Bang: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Digital Big Bang»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
  Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age.
explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. 
This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book:
Guides readers on both fundamental tactics and advanced strategies Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues Helps readers work with the central elements of cybersecurity, rather than fight or ignore them Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell
is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.

The Digital Big Bang — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Digital Big Bang», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

For example, the maps of the world from 750 years ago had elaborate drawings of mid-ocean whirlpools and sea monsters—here be dragons—mid-continent mountain ranges, and other physical phenomena. Faulty thinking, and the desire to warn of the dangers of sea exploration, led mapmakers to fill in what they did not know.

In contrast, the maps of the Scientific Age were drawn with large blank areas, showing where we had no data. It was not until we admitted that we in fact had very little idea what was beyond the horizon, or mid-ocean or continent, that we began exploring those areas and filling in the missing pieces that led to a much better understanding of our world.

The pull of curiosity about basic principles reduced the fear of the unknown and prompted the physical world's golden age of scientific education.

Now we must make the same leap in cybersecurity. We need to stop quaking at the cyber threats—real and imagined—and get down to the business of defining how to navigate and master those threats.

THE BANG BEGINS

A masterpiece of international collaboration, the Internet has its roots in the desire to share computing and information resources and the US Department of Defense's goal of establishing connectivity via computers in the event of a nuclear attack that destroyed telephone systems.

On October 29, 1969, the first message was sent over what would eventually become the Internet. Meant to be the word “login,” the letters “L” and “O” were sent from researchers at UCLA to a team at Stanford. Then the system crashed. (We'll pause while you chuckle about that first crash.)

When it was constructed and deployed, the Internet served as a communication platform for a tightly restricted group of specific users.

With the advent of packet switching—the division of information into smaller blocks to be transmitted and then reassembled, pioneered as a Cold War strategy—that communication became a viable, though intensely limited, reality.

WHAT WE GOT RIGHT

Internet pioneers got speed and connectivity right—the digital big bang's equivalent of matter and energy. Their goal was a secure, distributed widespread computer communication system, and they achieved that goal.

WHAT WE GOT WRONG

Because the digital transmission of information was so restricted in both users and data, the use of ARPAnet was governed by a shared sense of trust that was informed and enforced by security clearances, professional accountability, and total lack of anonymity.

AN UNWARRANTED ASSUMPTION OF TRUST

With this assumption of trust, things went off-kilter. That assumption thwarted the parallel development of security, particularly trustworthy authentication, that could have supported the speed and connectivity that would make the Internet transformational.

With the passage in 1992 of the Scientific and Advanced-Technology Act, research and academic institutions started using this early Internet. Security shortfalls were generally understood, but the circle of institutions that had access remained small and tight-knit. It wasn't until 1993, and the release of the first web browser that Internet access became mainstream. At that point, both the Internet and its security, or lack of security, achieved greater significance.

The assumption of trust that was still deep within the DNA of the Internet became a huge problem the moment the public could go online. On an increasingly vast and anonymous network, that trust soon transformed from guiding philosophy to greatest weakness. As more people arrived, the Internet quickly became a newly discovered continent of naïve users, systems, and networks to be exploited and hacked for digital fraud, grift, or simply to prove it could be done.

Since those first hacks, the field of cybersecurity has struggled to catch up and compensate. Mitigating the weakness—the wrongful assumption of trust and the lack of strong authentication—while still balancing the essential benefits and fundamentals of speed and connectivity, remains an enduring challenge of cybersecurity today.

AN HONEST ASSESSMENT OF THE CURRENT STATE

For all the stunning power of its speed and the vastness of its data, the Internet is shockingly fragile and fallible. We're propping it up, sometimes with ridiculously complex schemas and other times with little more than digital Popsicle sticks and Elmer's glue and, for high-end applications, duct tape.

The Internet is fast, anonymous, powerful, and profitable—all factors that have accelerated its use and deployment—while at the same time prone to malicious exploitation, with terrible potential for criminality and sabotage. The continuing series of breaches of organizations of all levels of sophistication shows what a huge problem we have.

WHAT CYBERCRIMES EXPLOIT

Perhaps what is most amazing (or at least ironic) about cybercrime is how this masterpiece of technological collaboration and human connection is so often exploited to gratify human impulses. Distributed denial-of-service (DDoS) attacks, phishing emails, and ever-evolving scams manipulate recipients for the purpose of mass theft and extortion. From data corruption to identity theft, malware to man-in-the-middle attacks, the crimes that cybersecurity must mitigate and prevent run a gamut that only seems to get broader. Attacks are not only launched by criminals but also by rogue nation-states. Over time, these attacks become more destructive and less difficult to perpetrate.

The widening breadth of cybercrime is a direct reflection of our expanding global attack surface—and the increasing commodification of threat. The digital criminal barrier for entry that individuals and organizations alike must defend against is lower than ever. Today, it can be as easy to purchase a cyberattack as it is to buy a cup of coffee, and often even cheaper. We must defend ourselves from near constant silent digital attacks on the fabric of our societies, all roiling beneath the surface of an increasingly interconnected world.

Today, there is little difference between cybersecurity and national, even global, security. As we have seen time and again in reported malicious cyber activity—often in chilling reports of narrowly averted attacks—we can be reached at the most foundational levels by nearly anyone, from anywhere.

WHAT WE CAN GET RIGHT NOW

With so much at stake, it's time to borrow a page from the Scientific Revolution:

Scientific Revolution Cybersecurity Scientific Revolution
Admit our ignorance (redraw the earth's maps). Acknowledge what we got wrong (authentication).
Use steadily increased strategies for becoming masters of our physical domain (sail oceans, fly planes, explore space). Implement steadily stronger strategies to become masters of the cyber domain.
Replace fear with curiosity. Replace outmoded assumptions and strategies with rigorous fundamental strategies that build up to advanced strategies.

We need to stop expecting our network operators to continuously run ahead of ever more sophisticated attacks. You can't outrun the speed of light.

We can achieve better cybersecurity by thinking like physicists and chemists, by postulating and outlining the theorems and proofs necessary to master the cyberspace domain. As critical as these fundamentals are, though, they can easily be overlooked or forgotten by a digital culture that looks myopically to the near future, placing short-term gains ahead of long-term stability and sustainability. Cybersecurity is a marathon—not a sprint.

As our connectivity expands and deepens, the strength and intractability of these fundamentals only becomes more apparent. And more necessary.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Digital Big Bang»

Представляем Вашему вниманию похожие книги на «The Digital Big Bang» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Digital Big Bang»

Обсуждение, отзывы о книге «The Digital Big Bang» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x