Phil Quade - The Digital Big Bang

Здесь есть возможность читать онлайн «Phil Quade - The Digital Big Bang» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Digital Big Bang: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Digital Big Bang»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
  Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age.
explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. 
This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book:
Guides readers on both fundamental tactics and advanced strategies Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues Helps readers work with the central elements of cybersecurity, rather than fight or ignore them Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell
is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.

The Digital Big Bang — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Digital Big Bang», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

With the exponential increase of digital connectivity, cyber-physical interfaces (in the Internet of Things), and machine learning and artificial intelligence, it is more important than ever to treat cybersecurity as a science and a business enabler, as opposed to simply a cost of doing business.

We must reveal the connection between fundamental scientific principles and cybersecurity best practices. What are the foundational primitives and rules that would have been beneficial to have at the beginning of the Internet? How would things have been different if they had been in place? How can we create a better form of cybersecurity based on the nature of fundamental forces and accurate assumptions?

Embracing cybersecurity as a science can be an incredibly powerful and effective way to underpin innovation. It will enable us to focus on effectively leveraging the Internet's forces of speed and connectivity as well as one more unchangeable force that we'll talk about later in this book: the fallibility and needs of humans.

It is a bold goal to attempt to make cybersecurity more scientific, but in our view, it is achievable with the right vision and engineering. By doing so, we can further extend the power of speed and connectivity to thrive within the digital world. Rather than suffering through the cosmic big bang's equivalent of the melting of our planet by the death of our sun billions of years from now, let's understand, define, and work within the laws of the science of cybersecurity.

THE DIGITAL NUCLEUS

As mentioned earlier, the most fundamental forces of cybersecurity are speed and connectivity. Our solutions must be built to support and leverage these forces.

Although security has historically slowed things down, security without speed is a losing proposition. Similarly, security is only as strong as the weakest link in the chain, so security must enable connectivity—specifically, an integration of your defenses to leverage your strengths. This is a far better core strategy than the common alternative: expecting your weakest point to be better than the adversary's strongest methods. To achieve not only optimal but even basically functional cybersecurity, we must have speed, connectivity, and integrated cybersecurity.

In the pages that follow, we will explore the scientific forces of speed and connectivity that must shape our approach (see Figure 1). We must show how to harness and amplify these forces with cybersecurity that offers greater degrees of precision to counter the increasing sophistication of threat actors and cybercriminals.

Figure 1 Speed and connectivity form the nucleus of the digital big bang We - фото 3

Figure 1 Speed and connectivity form the nucleus of the digital big bang.

We will explore how we can create a more scientific approach to cybersecurity, based on accurate assumptions. We will probe the essence of the modern problems we face and see how lessons from the world of science extend to cyberspace, leading us to certain inevitable mind-expanding conclusions about the very nature and order of how cybersecurity must evolve.

This book is divided into parts. Part Iexplores the digital nucleus of speed and connectivity.

Part IIdetails the elementary shortfalls in the areas of authentication, patching, and training, and Part IIIdiscusses fundamental strategies of access control, cryptography, and segmentation.

Part IVcovers advanced strategies, including visibility, inspection, and failure recovery, and Part Vlays out higher-order dimensions we must account for, including complexity management, privacy, and human frailty.

In keeping with the spirit of the Internet's invention, this book is a collaborative effort. For each of the topics mentioned, we will hear from some of the leading experts in cybersecurity today, across industries and disciplines, as they come together to offer their insights.

We define success as enabling a pace of innovation in the field of security that outruns the inevitable attempts by adversaries to do their dirty deeds.

It is our hope that by focusing on the fundamental and foundational principles of the science of cybersecurity, this book will empower those who fight the battles to achieve more effective, efficient, and consistent victories for many years to come.

SECTION 1 BINDING STRATEGIES:THE CORE OF CYBERSECURITY

The central parallel between the cosmic big bang and the digital big bang rests - фото 4

The central parallel between the cosmic big bang and the digital big bang rests in their origins. The cosmic big bang unleashed the two central forces of matter and energy, inexorably connecting them in a way that has shaped and driven our entire existence. The invention of the Internet harnessed technological innovation to weld speed and connectivity—the central forces of the digital big bang equivalent to matter and energy—as a means of communication so powerful it has the potential to change the future of the human race.

Because speed and connectivity are the two primary elements of the Internet, harnessing their strengths and managing their risks must be the primary elements of any effective security strategy.

But too often cybersecurity is at odds with speed and connectivity.

THE NEED FOR SPEED

The Internet created a game-changing means to increase the velocity of information and the speed at which business can be done—to send data faster, accelerating the rate at which we can connect and communicate with others. Remember the days of sending data on disks through the mail? From those early academic uses, that connection has grown. Now the connection includes large-scale business and personal interests, contains our most sensitive health and financial information, and falls within the private and public sectors. Or we may use that connection for sheer entertainment.

The velocity with which we can now send and receive even massive amounts of data is staggering and getting faster every day. We can search for obscure facts, with answers in seconds; communicate in real time with people all over the world; and buy products with one easy click. Regardless of their use and application, today's systems of digital data transmission were designed to be faster than any other means at the time, and they have consistently exceeded that goal.

But to date, that speed has been a problem for defenders. Defensive systems often leach CPU cycles, forcing communication to slow down. When that happens, users often will simply turn off security features, leaving the network and its data vulnerable to attackers. To succeed, our security strategies must be based on leveraging that core philosophy of doing things at Internet speed.

THE DRIVE TO CONNECT

The Internet's creation was a testament to the power of collaboration. Researchers realized that they could achieve more insightful results by comparing and combining their efforts and getting access to remote computing resources.

The resulting architecture was designed around rich and resilient connectivity. As it matured, the Internet fulfilled deep needs for speed and connectivity—organizational, financial, physical, mental, and even emotional—which catalyzed its unprecedented proliferation.

But that highly desired connectivity also opened the door to attacks. Attackers soon learned that they could use connectivity to their advantage to achieve a malicious effect without being near their actual target. Adversaries now can launch attacks from multiple places, focusing their multifaceted barrage on points of weakness. Perhaps it is the central dilemma of cybersecurity: if you can connect with everybody, you can be reached by anybody.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Digital Big Bang»

Представляем Вашему вниманию похожие книги на «The Digital Big Bang» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Digital Big Bang»

Обсуждение, отзывы о книге «The Digital Big Bang» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x