Skip to main content

Security Awareness: Brave New World

  • Chapter
  • First Online:
Information Security Planning
  • 406 Accesses

Abstract

Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close all holes, you can only hope to close most holes, layer defenses (like you layer clothes when going out in the freezing cold), and hope that the intruder will find an easier target elsewhere. This chapter is about educating yourself about malware, hacking and the motives of computer attackers, and how to start to defend the simplest of devices: your mobile and home computers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perlroth N (2021) Are we waiting for everyone to get hacked? New York Times, 5 June 2021

    Google Scholar 

  2. Verizon (2022) Verizon 2022 data breach investigations report. https://www.verizon.com/business/resources/reports/dbir

  3. Popper N, Sengupta S (2013) U.S. says ring stole 160 million credit card numbers. New York Times, 25 July 2013

    Google Scholar 

  4. Pereira J, Levitz J, Singer-Vine J (2008) U.S. indicts 11 in global credit card scheme. Wall Street Journal, 6 August 2008

    Google Scholar 

  5. Smith R (2013) Elementary information security. Jones & Bartlett Learning, Burlington, p 102

    Google Scholar 

  6. Perlroth N (2013) Malware that drains your bank account thriving on Facebook. New York Times, 3 June 2013

    Google Scholar 

  7. Symantec (2013) Internet security threat report 2013, vol 18. Symantec Corp., Mountain View, 13 April 2013

    Google Scholar 

  8. Perlroth N (2012) Widespread virus proves macs are no longer safe from hackers. New York Times, 6 April 2012

    Google Scholar 

  9. PCI Security Standards Council (2022) Requirements and testing procedures, v 4.0, March 2022. www.pcisecuritystandards.org

  10. Center for Internet Security (2022) CIS Microsoft Windows 10 Enterprise Benchmark, v1.12.0, 15 February 2022

    Google Scholar 

  11. Symantec (2014) Internet security threat report 2014, vol 19. Symantec Corp., Mountain View, April 2014

    Google Scholar 

  12. Biersdorfer JD (2013) Q&A: avoiding mobile malware. New York Times, 8 July 2013

    Google Scholar 

  13. Chen BX, Perlroth N (2013) U.S. accuses 13 hackers in web attacks. New York Times, 3 October 2013

    Google Scholar 

  14. Perlroth N, Moynihan C (2013) Lulzsec hacker pleads guilty. New York Times, 28 May 2013

    Google Scholar 

  15. Perlroth N, Markoff J (2013) NSA may have hit companies at a weak spot. New York Times, 26 November 2013

    Google Scholar 

  16. Gellman B, Soltani A (2013) NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. Washington Post, 30 October 2013

    Google Scholar 

  17. Perlroth N, Larson J, Shane S (2013) NSA able to foil basic safeguards of privacy on web. New York Times, 5 September 2013

    Google Scholar 

  18. Perlroth N, Shane S (2013) As FBI pursued Snowden, an E-mail service stood firm. New York Times, 2 October 2013

    Google Scholar 

  19. Menn J (2013) Encrypted email service thought used by Snowden shuts down. Reuters. http://www.reuters.com/article/2013/08/09/us-usa-security-snowden-email-idUS BRE97800520130809. Accessed 9 Aug 2013

  20. Crowley S (2014) Obama’s speech on N.S.A. phone surveillance (transcript). New York Times, 17 January 2014

    Google Scholar 

  21. Perlroth N (2013) Hackers in China attacked the times for last 4 months. New York Times, 30 January 2013

    Google Scholar 

  22. How a secret CyberWar program worked (graphic). New York Times, 1 June 2012

    Google Scholar 

  23. Rauscher K (2013) Writing the rules of cyberwar. In: IEEE spectrum, N. American Ed., pp 30–32, December 2013

    Google Scholar 

  24. Bilton N (2013) Disruptions: as new targets for hackers, your car and your house New York Times, 11 August 2013

    Google Scholar 

  25. Wyatt E (2013) F.T.C. says Webcam’s flaw put users’ lives on display. New York Times, 4 September 2013

    Google Scholar 

  26. Kim D, Solomon MG (2012) Fundamentals of information systems security. Jones & Bartlett Learning, Sudbury, p 360

    Google Scholar 

  27. Anon (2010) U.S. department of justice; leader of hacking ring sentenced for massive identity thefts from payment processor and U.S. retail networks. Biotech Business Week, 12 April 2010

    Google Scholar 

  28. Perlroth N (2014) Report analyzes extent of data breaches in California. New York Times, 28 October 2014

    Google Scholar 

  29. Greenberg A (2017) How an entire nation became Russia’s test lab for cyberwar. WIRED, 20 June 2017. From: www.wired.com/story/russian-hackers-attack-ukraine

  30. Symantec (2018) Internet security threat report 2018, vol 23. Symantec Corp. Mountain View

    Google Scholar 

  31. Sanger DE, Perlroth N (2021) Pipeline attack yields urgent lessons about U.S. cybersecurity. New York Times, 14 May 2021, Updated 8 June 2021

    Google Scholar 

  32. Perlroth N, Sanger D E, Barnes J E (2021) Widely used software company may be entry point for huge U.S. hacking. New York Times, 6 January, 2021. Updated 11 January 2021

    Google Scholar 

  33. Bhattacharjee Y (2023) The daring ruse that exposed China’s campaign to steal American secrets: how the downfall of one intelligence agent revealed the astonishing depth of Chinese industrial espionage. New York Times Magazine, updated 8 March 2023

    Google Scholar 

  34. Schneier B (2021) Why was solar winds so vulnerable to a hack? New York Times, 23 February 2021. https://www.nytimes.com/2021/02/23/opinion/solarwinds-hack.html?searchResultPosition=9

  35. Austin J, Lincke S (2019) Cyberwarfare: a risk assessment for isolating electricity SCADA systems. The 23rd world multi-conference on systemics, cybernetics and informatics, vol 2. International Institute of Informatics and Systemics, Orlando, 6–9 July 2019, pp. 105–110

    Google Scholar 

  36. CrowdStrike (2022) CrowdStrike 2022 global threat report. https://go.crowdstrike.com/global-threat-report-2022.html

  37. Weingand S (2022) Ex-Uber chief security officer convicted of covering up 2016 breach. SC Magazine, 5 October 2022. https://www.scmagazine.com/news/compliance/ex-uber-chief-security-officer-convicted-of-covering-up-2016-breach

  38. Manancourt V (2022) Instagram fined €405M for violating kids’ privacy. Politico, 5 September 2022

    Google Scholar 

  39. Verizon 2013 Data Breach Investigations Report”, www.verizonenterprise.com/DBIR/2013, taken Oct 20, 2013

    Google Scholar 

  40. Perlroth, N. and Shane, S. “As FBI Pursued Snowden, an E-Mail Service Stood Firm”, New York Times, Oct. 2, 2013

    Google Scholar 

  41. Stiennon, S., “Keynote lunch: How the surveillance state is changing IT security forever.”, SC Congress Chicago, Nov. 20, 2013

    Google Scholar 

  42. Reuters, “Man Accused of Stealing Stores’ Data Pleads Guilty”, New York Times, Aug. 29, 2009

    Google Scholar 

  43. Hoffman, K. E. “Botnets 3.0”, SC Magazine, www.scmagazine.com, July 2013, p. 30-31

    Google Scholar 

  44. Brelsford, E. “2014: A Cyber Odyssey”, ISACA Chicago Chapter Meeting, Rosemont IL, Dec. 13, 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susan Lincke .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lincke, S. (2024). Security Awareness: Brave New World. In: Information Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-031-43118-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-43118-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-43117-3

  • Online ISBN: 978-3-031-43118-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics