CUCKOO'S EGG

Author: Clifford Stoll

Publisher: Doubleday

ISBN: 0307819426

Category: True Crime

Page: 326

View: 6833

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Kuckucksei

Die Jagd auf die deutschen Hacker, die das Pentagon knackten

Author: Clifford Stoll

Publisher: S. Fischer Verlag

ISBN: 3105607242

Category: Fiction

Page: 454

View: 8741

›Kuckucksei‹ schildert bis ins Detail die hochdramatische Jagd nach deutschen Hackern, die in amerikanische Computernetze eingedrungen waren. Es ist der autobiografische Report eines amerikanischen Computercracks, der leidenschaftlich für die Sicherheit der Datennetze kämpft. (Dieser Text bezieht sich auf eine frühere Ausgabe.)

Kuckucksei

Die Jagd auf die deutschen Hacker, die das Pentagon knackten

Author: Clifford Stoll

Publisher: N.A

ISBN: 9783596307227

Category:

Page: 452

View: 5603

Das Phantom im Netz

Die Autobiographie des meistgesuchten Hackers der Welt

Author: Kevin Mitnick,Kevin; Simon Mitnick

Publisher: Riva Verlag

ISBN: 3864131723

Category: Biography & Autobiography

Page: 460

View: 5165

Dies ist eine wahre Geschichte über Intrigen, Manipulation und eine abenteuerliche Flucht. Zugleich ist es das Porträt eines Genies, dessen Einfallsreichtum, Beharrlichkeit und Fähigkeiten eine ganze Branche zum Umdenken zwangen. Kevin Mitnick war der meistgesuchte Hacker der Welt. Er verschaffte sich mehrfach Zutritt zu den Computern der weltgrößten Firmen wie Sun Microsystems, Motorola, Nokia und Fujitsu Siemens und enttarnte deren Anfälligkeit. Sogar Einbrüche in Computer des Pentagons wurden ihm vorgeworfen. Egal wie schnell die Behörden reagierten, Mitnick war ihnen immer drei Schritte voraus. Doch das Netz des FBI zog sich immer weiter zu. Es begann ein dramatisches Katz-und-Maus-Spiel, bei dem der Hacker seiner Festnahme oft nur um Haaresbreite entging – bis zu einem spektakulären Showdown, bei dem es für ihn kein Entrinnen mehr gab. Mitnick wurde ohne Prozess viereinhalb Jahre gefangen gehalten, davon acht Monate in Einzelhaft, da die FBI-Beamten einen Richter davon überzeugen konnten, er sei in der Lage "einen Atomkrieg auszulösen, indem er in ein Telefon pfeift". Nach sieben Jahren Schweigepflicht geht der Hacker in seiner Autobiografie aufs Ganze: Er erzählt nicht nur seine Geschichte, sondern rechnet auch mit Justiz und Presse ab.

Secrets & lies

IT-Sicherheit in einer vernetzten Welt

Author: Bruce Schneier

Publisher: N.A

ISBN: 9783898643023

Category:

Page: 408

View: 5083

Willkommen in der New Economy, der Welt der digitalen Wirtschaft. Informationen sind leichter zugänglich als je zuvor. Die Vernetzung wird dicher, und digitale Kommunikation ist aus den Unternehmen nicht mehr wegzudenken. Die Begeisterung für die Technologie hat jedoch Ihren Preis: Die Zahl der Sicherheitsrisiken nimmt ständig zu. Die neuen Gefahren, die mit dem E-Business verknüpft sind, müssen den Unternehmen weltweit aber erst klar werden. Dieses Buch ist ein erster Schritt in diese Richtung. Bruce Schneier, anerkannter Experte im Bereich Kryptographie, erklärt, was Unternehmen über IT-Sicherheit wissen müssen, um zu überleben und wettbewerbsfähig zu bleiben. Er deckt das gesamte System auf, von den Ursachen der Sicherheitslücken bis hin zu den Motiven, die hinter böswilligen Attacken stehen. Schneier zeigt Sicherheitstechnologien und deren Möglichkeiten, aber auch deren Grenzen auf. Fundiert und anschaulich zugleich behandelt dieser praktische Leitfaden: - Die digitalen Bedrohungen und Angriffe, die es zu kennen gilt - Die derzeit verfügbaren Sicherheitsprodukte und -prozesse - Die Technologien, die in den nächsten Jahren interessant werden könnten - Die Grenzen der Technik - Das Vorgehen, um Sicherheitsmängel an einem Produkt offenzulegen - Die Möglichkeiten, existierende Risiken in einem Unternehmen festzustellen - Die Implementierung einer wirksamen Sicherheitspolitik Schneiers Darstellung der digitalen Welt und unserer vernetzten Gesellschaft ist pragmatisch, interessant und humorvoll. Und sie ermöglicht es dem Leser, die vernetzte Welt zu verstehen und sich gegen ihre Bedrohungen zu wappnen. Hier finden Sie die Unterstützung eines Experten, die Sie für die Entscheidungsfindung im Bereich IT-Sicherheit brauchen.

LogOut

warum Computer nichts im Klassenzimmer zu suchen haben und andere High-Tech-Ketzereien

Author: Clifford Stoll

Publisher: N.A

ISBN: 9783596155125

Category:

Page: 252

View: 7110

Worm

Der erste digitale Weltkrieg

Author: Mark Bowden

Publisher: ebook Berlin Verlag

ISBN: 3827075203

Category: Science

Page: 288

View: 7773

Dass Cyberverbrechen und Cyberwar keine bloß virtuellen Gefahren mehr sind, sickert erst allmählich ins öffentliche und politische Bewusstsein. Als der Computerwurm »Conficker« im November 2008 auf die Welt losgelassen wurde, infizierte er binnen weniger Wochen Millionen von Computern weltweit. War er in ein System eingedrungen, konnte er dieses mit anderen verbinden und so ein Netzwerk bilden, das sich von außen kontrollieren ließ. Ein solch großes Botnetz ist theoretisch in der Lage, sämtliche Computernetzwerke zu überwältigen, ohne die heute unsere Banken, Telefone, Kraftwerke oder Flughäfen, ja sogar das Internet selbst kollabieren würden - mit unabsehbaren Folgen. War »Conficker« nur das Werkzeug von Cyberkriminellen oder gar eine reale militärische Waffe mit so nie dagewesenem Zerstörungspotenzial? Mark Bowden erzählt, wie in einem dramatischen Wettlauf Computerexperten alles daransetzen, den brandgefährlichen Wurm auszuschalten. Packend beschreibt er einen nach wie vor völlig unterschätzten Krieg, der buchstäblich unter unseren Fingerspitzen auf der Tastatur ausgefochten wird.

Everyday Computing in Academe

A Guide for Scholars, Researchers, Students, and Other Academic Users of Personal Computers

Author: Donald T. Mizokawa

Publisher: Educational Technology

ISBN: 9780877782766

Category: Computers

Page: 330

View: 9060

Cybersecurity

Public Sector Threats and Responses

Author: Kim J. Andreasson

Publisher: CRC Press

ISBN: 1439846634

Category: Computers

Page: 392

View: 9003

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections: Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.

The Frugal CISO

Using Innovation and Smart Approaches to Maximize Your Security Posture

Author: Kerry Ann Anderson

Publisher: CRC Press

ISBN: 1482220083

Category: Business & Economics

Page: 381

View: 1966

If you’re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today’s cost-cutting environment. The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology. The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise’s security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process. After reading this book you will understand how to manage an information security program with a limited budget, while still maintaining an appropriate level of security controls and meeting compliance requirements. The concepts and methods identified in this book are applicable to a wide variation of teams, regardless of organizational size or budget.

Rights and Responsibilities of Participants in Networked Communities

Author: Dorothy E. Denning,Herbert S. Lin

Publisher: National Academies

ISBN: N.A

Category: Language Arts & Disciplines

Page: 160

View: 5539

This report is based on a November 1992 workshop and a February 1993 public forum which discussed some of the social issues raised by the emergence of electronic communities. The workshop examined user, provider, and other perspectives on different types of networked communities, including those on the Internet, commercial information services, and grass-roots networks. The following questions were addressed in the workshop: (1) What policies, laws, regulations, or ethical standards apply to the use of networked services; who sets them; how are they developed; and how are they enforced? (2) What are users' expectations regarding privacy and protection of their proprietary rights? (3) What are the rights, responsibilities, and liabilities of providers or operators of networked services or of users of these services? and (4) What problems arise from connecting systems offering these services to systems that operate under different policies? The forum was organized around a set of hypothetical scenarios designed to illuminate how issues related to and associated with free speech, electronic vandalism, the protection of intellectual property interests, and privacy might emerge. The intent was to focus on the concerns that policymakers in government and the private sector might have, so much of the discussion involved questions of law and how the current legal regime helps to define the boundaries of what is or is not acceptable conduct on electronic networks. Background materials on technology, legal underpinnings, and the current policy environment are incorporated into chapters 1 through 3. Chapters 4 through 7 are devoted primarily to discussions of free speech, electronic vandalism, intellectual property interests, and privacy. Chapter 8 focuses on the deliberations of the steering committee. Five appendices provide information about network technology, the agendas for the workshop and forum, and biographies of the steering committee. (MAS)

Morality and Machines

Perspectives on Computer Ethics

Author: Stacey L. Edgar

Publisher: Jones & Bartlett Learning

ISBN: 9780763717674

Category: Business & Economics

Page: 522

View: 9351

Morality and Machines, Second Edition examines the moral issues that emerge from the influence of computers and technology on society today. The text provides an ethical foundation upon which readers can develop informed opinions about software piracy, computer crimes, artificial intelligence and more. With in-depth analysis of current moral and social problems, this text is an ideal resource for readers interested in philosophy, technological sciences, and computer ethics. This book is unique in that it takes seriously the need to lay a sound ethical basis for dealing with the technology of computers. The first two chapters of the book take on various positions that challenge the possibility of ethics and meet them head-on with counterarguments. The possibility of a viable ethics having been defended, Chapter 3 examines the most promising approaches to ethics, so that the explorer in the new realm with have appropriate tools and, if necessary, weapons at hand. At the end of the chapter, suggestions are given for approaching any ethical problem. Once armed, the adventurer is ready to investigate the various parts of the new country, described in the remaining chapters of the book.

Mafiaboy

A Portrait of the Hacker as a Young Man

Author: Michael Calce,Craig Silverman

Publisher: Rowman & Littlefield

ISBN: 0762768886

Category: True Crime

Page: 272

View: 1444

In 2000, an unknown attacker brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. The FBI, police, and independent security experts launched a manhunt as President Clinton convened a cyber security summit to discuss how best to protect America's information infrastructure from future attacks. Then, after hundreds of hours of wiretapping, law enforcement officials executed a late-night raid and came face-to-face with the most wanted man in cyberspace: a fifteen-year-old whose username was “Mafiaboy.” Despite requests from every major media outlet, that young man, Michael Calce, has never spoken publicly about his crimes—until now. Equal parts true-crime thriller and exposé, Mafiaboy will take you on an electrifying tour of the fast-evolving twenty-first-century world of hacking—from disruptions caused by teens like Calce to organized crime and other efforts with potentially catastrophic results. It also includes a guide to protecting yourself online.

Internet Denial of Service

Attack and Defense Mechanisms

Author: David Dittrich,Peter Reiher,Sven Dietrich

Publisher: Pearson Education

ISBN: 9780132704540

Category: Computers

Page: 400

View: 8302

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

Hackers

Crime and the Digital Sublime

Author: Paul Taylor

Publisher: Routledge

ISBN: 1134678266

Category: Social Science

Page: 200

View: 4209

The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike. Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

Enterprise Architecture and Information Assurance

Developing a Secure Foundation

Author: James A. Scholz

Publisher: CRC Press

ISBN: 1439841608

Category: Business & Economics

Page: 266

View: 4165

Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book’s comprehensive coverage includes: Infrastructure security model components Systems security categorization Business impact analysis Risk management and mitigation Security configuration management Contingency planning Physical security The certification and accreditation process Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention.

American Spies

Espionage against the United States from the Cold War to the Present

Author: Michael J. Sulick

Publisher: Georgetown University Press

ISBN: 1626160090

Category: Political Science

Page: 384

View: 8561

What’s your secret? American Spies presents the stunning histories of more than forty Americans who spied against their country during the past six decades. Michael Sulick, former head of the CIA’s clandestine service, illustrates through these stories—some familiar, others much less well known—the common threads in the spy cases and the evolution of American attitudes toward espionage since the onset of the Cold War. After highlighting the accounts of many who have spied for traditional adversaries such as Russian and Chinese intelligence services, Sulick shows how spy hunters today confront a far broader spectrum of threats not only from hostile states but also substate groups, including those conducting cyberespionage. Sulick reveals six fundamental elements of espionage in these stories: the motivations that drove them to spy; their access and the secrets they betrayed; their tradecraft, i.e., the techniques of concealing their espionage; their exposure; their punishment; and, finally, the damage they inflicted on America’s national security. The book is the sequel to Sulick’s popular Spying in America: Espionage from the Revolutionary War to the Dawn of the Cold War. Together they serve as a basic introduction to understanding America’s vulnerability to espionage, which has oscillated between peacetime complacency and wartime vigilance, and continues to be shaped by the inherent conflict between our nation’s security needs and our commitment to the preservation of civil liberties.

Der Turing Omnibus

Eine Reise durch die Informatik mit 66 Stationen

Author: A.K. Dewdney

Publisher: Springer-Verlag

ISBN: 3642788726

Category: Computers

Page: 496

View: 2806

Der Turing Omnibus macht in 66 exzellent geschriebenen Beiträgen Station bei den interessantesten Themen aus der Informatik, der Computertechnologie und ihren Anwendungen.

Inside Anonymous

Aus dem Innenleben des globalen Cyber-Aufstands

Author: Parmy Olson

Publisher: Redline Wirtschaft

ISBN: 3864142806

Category: Political Science

Page: 480

View: 8125

Erstmals packen die Hacker aus. Ende des Jahres 2010 nahmen weltweit Tausende an den digitalen Angriffen der Hackergruppe Anonymous auf die Webseiten von VISA, MasterCard und PayPal teil, um gegen die Sperrung der Konten von Wiki-Leaks zu protestieren. Splittergruppen von Anonymous infiltrierten die Netzwerke der totalitären Regime von Libyen und Tunesien. Eine Gruppe namens LulzSec schaffte es sogar, das FBI, die CIA und Sony zu attackieren, bevor sie sich wieder auflöste. Das Anonymous-Kollektiv wurde bekannt durch die charakteristische Guy-Fawkes-Maske, mit der sich die Aktivisten tarnen. Es steht für Spaß-Guerilla und politische Netzaktivisten ohne erkennbare Struktur, die mit Hacking-Attacken gegen die Scientology-Sekte und Internetzensur protestierten. Internetsicherheitsdienste und bald auch die gesamte Welt merkten schnell, dass Anonymous eine Bewegung war, die man sehr ernst nehmen sollte. Doch wer verbirgt sich eigentlich hinter den Masken? Inside Anonymous erzählt erstmalig die Geschichte dreier Mitglieder des harten Kerns: ihren Werdegang und ihre ganz persönliche Motivation, die sie zu überzeugten Hackern machte. Basierend auf vielen exklusiven Interviews bietet das Buch einen einzigartigen und spannenden Einblick in die Köpfe, die hinter der virtuellen Community stehen.

Educom Review

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Computer networks

Page: N.A

View: 7288

Computing and communications in colleges and universities.