Abstract
Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close all holes, you can only hope to close most holes, layer defenses (like you layer clothes when going out in the freezing cold), and hope that the intruder will find an easier target elsewhere. This chapter is about educating yourself about malware, hacking and the motives of computer attackers, and how to start to defend the simplest of devices: your mobile and home computers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perlroth N (2021) Are we waiting for everyone to get hacked? New York Times, 5 June 2021
Verizon (2022) Verizon 2022 data breach investigations report. https://www.verizon.com/business/resources/reports/dbir
Popper N, Sengupta S (2013) U.S. says ring stole 160 million credit card numbers. New York Times, 25 July 2013
Pereira J, Levitz J, Singer-Vine J (2008) U.S. indicts 11 in global credit card scheme. Wall Street Journal, 6 August 2008
Smith R (2013) Elementary information security. Jones & Bartlett Learning, Burlington, p 102
Perlroth N (2013) Malware that drains your bank account thriving on Facebook. New York Times, 3 June 2013
Symantec (2013) Internet security threat report 2013, vol 18. Symantec Corp., Mountain View, 13 April 2013
Perlroth N (2012) Widespread virus proves macs are no longer safe from hackers. New York Times, 6 April 2012
PCI Security Standards Council (2022) Requirements and testing procedures, v 4.0, March 2022. www.pcisecuritystandards.org
Center for Internet Security (2022) CIS Microsoft Windows 10 Enterprise Benchmark, v1.12.0, 15 February 2022
Symantec (2014) Internet security threat report 2014, vol 19. Symantec Corp., Mountain View, April 2014
Biersdorfer JD (2013) Q&A: avoiding mobile malware. New York Times, 8 July 2013
Chen BX, Perlroth N (2013) U.S. accuses 13 hackers in web attacks. New York Times, 3 October 2013
Perlroth N, Moynihan C (2013) Lulzsec hacker pleads guilty. New York Times, 28 May 2013
Perlroth N, Markoff J (2013) NSA may have hit companies at a weak spot. New York Times, 26 November 2013
Gellman B, Soltani A (2013) NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. Washington Post, 30 October 2013
Perlroth N, Larson J, Shane S (2013) NSA able to foil basic safeguards of privacy on web. New York Times, 5 September 2013
Perlroth N, Shane S (2013) As FBI pursued Snowden, an E-mail service stood firm. New York Times, 2 October 2013
Menn J (2013) Encrypted email service thought used by Snowden shuts down. Reuters. http://www.reuters.com/article/2013/08/09/us-usa-security-snowden-email-idUS BRE97800520130809. Accessed 9 Aug 2013
Crowley S (2014) Obama’s speech on N.S.A. phone surveillance (transcript). New York Times, 17 January 2014
Perlroth N (2013) Hackers in China attacked the times for last 4 months. New York Times, 30 January 2013
How a secret CyberWar program worked (graphic). New York Times, 1 June 2012
Rauscher K (2013) Writing the rules of cyberwar. In: IEEE spectrum, N. American Ed., pp 30–32, December 2013
Bilton N (2013) Disruptions: as new targets for hackers, your car and your house New York Times, 11 August 2013
Wyatt E (2013) F.T.C. says Webcam’s flaw put users’ lives on display. New York Times, 4 September 2013
Kim D, Solomon MG (2012) Fundamentals of information systems security. Jones & Bartlett Learning, Sudbury, p 360
Anon (2010) U.S. department of justice; leader of hacking ring sentenced for massive identity thefts from payment processor and U.S. retail networks. Biotech Business Week, 12 April 2010
Perlroth N (2014) Report analyzes extent of data breaches in California. New York Times, 28 October 2014
Greenberg A (2017) How an entire nation became Russia’s test lab for cyberwar. WIRED, 20 June 2017. From: www.wired.com/story/russian-hackers-attack-ukraine
Symantec (2018) Internet security threat report 2018, vol 23. Symantec Corp. Mountain View
Sanger DE, Perlroth N (2021) Pipeline attack yields urgent lessons about U.S. cybersecurity. New York Times, 14 May 2021, Updated 8 June 2021
Perlroth N, Sanger D E, Barnes J E (2021) Widely used software company may be entry point for huge U.S. hacking. New York Times, 6 January, 2021. Updated 11 January 2021
Bhattacharjee Y (2023) The daring ruse that exposed China’s campaign to steal American secrets: how the downfall of one intelligence agent revealed the astonishing depth of Chinese industrial espionage. New York Times Magazine, updated 8 March 2023
Schneier B (2021) Why was solar winds so vulnerable to a hack? New York Times, 23 February 2021. https://www.nytimes.com/2021/02/23/opinion/solarwinds-hack.html?searchResultPosition=9
Austin J, Lincke S (2019) Cyberwarfare: a risk assessment for isolating electricity SCADA systems. The 23rd world multi-conference on systemics, cybernetics and informatics, vol 2. International Institute of Informatics and Systemics, Orlando, 6–9 July 2019, pp. 105–110
CrowdStrike (2022) CrowdStrike 2022 global threat report. https://go.crowdstrike.com/global-threat-report-2022.html
Weingand S (2022) Ex-Uber chief security officer convicted of covering up 2016 breach. SC Magazine, 5 October 2022. https://www.scmagazine.com/news/compliance/ex-uber-chief-security-officer-convicted-of-covering-up-2016-breach
Manancourt V (2022) Instagram fined €405M for violating kids’ privacy. Politico, 5 September 2022
Verizon 2013 Data Breach Investigations Report”, www.verizonenterprise.com/DBIR/2013, taken Oct 20, 2013
Perlroth, N. and Shane, S. “As FBI Pursued Snowden, an E-Mail Service Stood Firm”, New York Times, Oct. 2, 2013
Stiennon, S., “Keynote lunch: How the surveillance state is changing IT security forever.”, SC Congress Chicago, Nov. 20, 2013
Reuters, “Man Accused of Stealing Stores’ Data Pleads Guilty”, New York Times, Aug. 29, 2009
Hoffman, K. E. “Botnets 3.0”, SC Magazine, www.scmagazine.com, July 2013, p. 30-31
Brelsford, E. “2014: A Cyber Odyssey”, ISACA Chicago Chapter Meeting, Rosemont IL, Dec. 13, 2013.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lincke, S. (2024). Security Awareness: Brave New World. In: Information Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-031-43118-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-43118-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43117-3
Online ISBN: 978-3-031-43118-0
eBook Packages: Computer ScienceComputer Science (R0)