Phil Quade - The Digital Big Bang

Здесь есть возможность читать онлайн «Phil Quade - The Digital Big Bang» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Digital Big Bang: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Digital Big Bang»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
  Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age.
explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. 
This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book:
Guides readers on both fundamental tactics and advanced strategies Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues Helps readers work with the central elements of cybersecurity, rather than fight or ignore them Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell
is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.

The Digital Big Bang — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Digital Big Bang», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Table of Contents

1 Cover

2 ABOUT THE AUTHOR ABOUT THE AUTHOR Phil Quade is the CISO of Fortinet. Quade brings more than three decades of cyber intelligence, defense, and attack experience, working across foreign, government, and commercial industry sectors at the National Security Agency (NSA), and partner organizations such as US Cyber Command, the CIA, and others. Quade has responsibility for Fortinet's information and product security, leads strategy and expansion of Fortinet's Federal and Critical Infrastructure business, and serves as a strategic consultant to Fortinet's C-Level enterprise customers. Prior to Fortinet, Quade was the NSA Director's Special Assistant for Cyber and Chief of the NSA Cyber Task Force, with responsibility for the White House relationship in cybersecurity. Previously, Quade also served as the chief operating officer of the Information Assurance Directorate at the NSA, managing day-to-day activities associated with the protection of classified information systems. He held a variety of roles earlier in his tenure at the NSA, including head of the Information Operations Technology Center's Advanced Technology Group, professional staffer to the US Senate, detailee in the Office of the Director for National Intelligence, cryptanalyst, and computer scientist.

3 CONTRIBUTORS

4 ACKNOWLEDGMENTS ACKNOWLEDGMENTS Although I am the named author of this volume, this book is the result of a much broader team effort. This book would not be possible without the contributions by leaders and experts in the field. All of the contributors are big thinkers and good cybercitizens—colleagues who give their time and energy to advancing the science of cybersecurity and who make our digital universe a better place. I would first like to thank Ken Xie and the entire Fortinet team for supporting me in creating this book and providing me with the opportunity to explore and write about these topics. And I especially want to thank Sandra Wheatley-Smerdon, my work colleague, who was instrumental in launching this exploration of the “big history” of cybersecurity.

5 INTRODUCTION THE COSMIC BIG BANG: THE BIRTH OF THE PHYSICAL UNIVERSE AND THE HUMAN SOCIETY THAT EMERGED THE DIGITAL BIG BANG: THE BIRTH OF THE DIGITAL UNIVERSE THE SCIENTIFIC REVOLUTION THE BANG BEGINS WHAT WE GOT RIGHT WHAT WE GOT WRONG AN UNWARRANTED ASSUMPTION OF TRUST AN HONEST ASSESSMENT OF THE CURRENT STATE WHAT CYBERCRIMES EXPLOIT WHAT WE CAN GET RIGHT NOW THE DIGITAL NUCLEUS

6 SECTION 1: BINDING STRATEGIES: THE CORE OF CYBERSECURITY 1 SPEED SPEED: THE NUCLEUS OF THE CYBERFRONTIER IS SPEED AN ADVANTAGE? IT DEPENDS ON THE CONTEXT 2 CONNECTIVITY MANAGING THE INTENSIFYING CONNECTIVITY OF THE IOT ERA CYBERSPACE: MAKING SOME SENSE OF IT ALL

7 SECTION 2: ELEMENTARY SHORTFALLS: THE THINGS WE DIDN'T GET RIGHT AT THE BEGINNING 3 AUTHENTICATION AUTHENTICATION, DATA INTEGRITY, NONREPUDIATION, AVAILABILITY, AND CONFIDENTIALITY: THE FIVE PILLARS OF SECURITY AUTHENTICATION AND MODELS OF TRUST 4 PATCHING PATCHING: A GROWING CHALLENGE AND A NEEDED DISCIPLINE CONQUER OR BE CONQUERED 5 TRAINING FILL THE SKILLS GAP WITH AN ENVIRONMENT OF CONTINUAL TRAINING EMPLOYEE TRAINING IS KEY FOR CYBERSECURITY TRAINING IS A MINDSET

8 SECTION 3: FUNDAMENTAL STRATEGIES: PROVEN STRATEGIES THAT DON'T LET US DOWN 6 CRYPTOGRAPHY CRYPTOGRAPHY: THE BACKBONE OF CYBERSECURITY CRYPTOGRAPHY: THE GOOD, THE BAD, AND THE FUTURE 7 ACCESS CONTROL MANAGING ACCESS IN CHALLENGING ENVIRONMENTS A SYSTEMATIC APPROACH TO ACCESS CONTROL 8 SEGMENTATION SUCCESSFUL SEGMENTATION ISN'T SEPARATION: IT'S COLLABORATION WHY WE NEED TO SEGMENT NETWORKS

9 SECTION 4: ADVANCED STRATEGIES: SOPHISTICATED CYBERSECURITY OPERATIONS 9 VISIBILITY VISIBILITY: IDENTIFYING PATHOGENS, RISK FACTORS, AND SYMPTOMS OF CYBERATTACKS 20/20 INSIGHT: REDEFINING VISIBILITY TO STOP MODERN CYBERCRIME SYNDICATES THE CHALLENGE OF VISIBILITY 10 INSPECTION IN AND OUT OF THE SHADOWS: THE VISIBILITY THAT INSPECTION ENABLES IS NOT CONFINED TO TECHNOLOGY ALONE THE FUNDAMENTAL IMPORTANCE OF INSPECTION 11 FAILURE RECOVERY PREPARATION, RESPONSE, AND RECOVERY CYBER EVENT RECOVERY

10 SECTION 5: HIGHER-ORDER DIMENSIONS: WHERE HUMAN FACTORS CAN ECLIPSE COMPUTING WIZARDRY 12 COMPLEXITY MANAGEMENT SHIFT YOUR MINDSET TO MANAGE COMPLEXITY SEVEN STEPS TO REDUCING COMPLEXITY 13 PRIVACY DON'T PANIC! SECURITY PROS MUST LEARN TO EMBRACE THE NEW ERA OF PRIVACY STRICTER PRIVACY REGULATIONS ARE DRIVING THE CONVERSATIONS—AND INNOVATIONS—WE NEED 14 HUMAN FRAILTY OVERCOMING HUMAN FRAILTY: PEOPLE AND THE POWER OF OBLIGATION OVERCOMING HUMAN FRAILTY BY DESIGN

11 THE FUTURE UNIFYING FORCES RELATIONSHIPS INFORMED OPTIMISM PURSUIT OF FACTS AND WISDOM MACHINES THAT SERVE PEOPLE CONCLUSION WHY CYBERSECURITY NEEDS AI THE FUTURE OF CYBERSECURITY

12 INDEX

13 End User License Agreement

List of Illustrations

1 INTRODUCTION Figure 1 Speed and connectivity form the nucleus of the digital big bang.

Guide

1 Cover

2 Table of Contents

3 Begin Reading

Pages

1 iii

2 iv

3 v

4 vii

5 ix

6 xi

7 xvii

8 xviii

9 xix

10 xx

11 xxi

12 xxii

13 xxiii

14 xxiv

15 xxv

16 xxvi

17 xxvii

18 1

19 2

20 3

21 4

22 5

23 6

24 7

25 8

26 9

27 10

28 11

29 12

30 13

31 14

32 15

33 16

34 17

35 18

36 19

37 20

38 21

39 22

40 23

41 24

42 25

43 26

44 27

45 28

46 29

47 30

48 31

49 32

50 33

51 34

52 35

53 36

54 37

55 38

56 39

57 40

58 41

59 43

60 44

61 45

62 46

63 47

64 48

65 49

66 50

67 51

68 52

69 53

70 54

71 55

72 56

73 57

74 58

75 59

76 60

77 61

78 62

79 63

80 64

81 65

82 66

83 67

84 68

85 69

86 70

87 71

88 72

89 73

90 74

91 75

92 76

93 77

94 78

95 79

96 80

97 81

98 82

99 83

100 84

101 85

102 86

103 87

104 88

105 89

106 90

107 91

108 92

109 93

110 94

111 95

112 96

113 97

114 98

115 99

116 100

117 101

118 102

119 103

120 104

121 105

122 106

123 107

124 108

125 109

126 110

127 111

128 112

129 113

130 114

131 115

132 116

133 117

134 118

135 119

136 120

137 121

138 122

139 123

140 124

141 125

142 126

143 127

144 128

145 129

146 130

147 131

148 132

149 133

150 134

151 135

152 136

153 137

154 138

155 139

156 140

157 141

158 142

159 143

160 144

161 145

162 146

163 147

164 148

165 149

166 150

167 151

168 152

169 153

170 154

171 155

172 156

173 157

174 158

175 159

176 160

177 161

178 162

179 163

180 164

181 165

182 166

183 167

184 168

185 169

186 170

187 171

188 172

189 173

190 174

191 175

192 176

193 177

194 178

195 179

196 180

197 181

198 182

199 183

200 184

201 185

202 186

203 187

204 188

205 189

206 190

207 191

208 192

209 193

210 194

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Digital Big Bang»

Представляем Вашему вниманию похожие книги на «The Digital Big Bang» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Digital Big Bang»

Обсуждение, отзывы о книге «The Digital Big Bang» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x