ミッコ・ヒッポネン著/スマートで脆弱:インターネットの光と影<br>If It's Smart, It's Vulnerable

個数:
電子版価格
¥2,758
  • 電子版あり

ミッコ・ヒッポネン著/スマートで脆弱:インターネットの光と影
If It's Smart, It's Vulnerable

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 288 p.
  • 言語 ENG
  • 商品コード 9781119895183
  • DDC分類 005

Full Description

Reimagine the future of the internet

All our devices and gadgets—from our refrigerators to our home security systems, vacuum cleaners, and stereos—are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters?

In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best—and worst—things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more.

Readers will also find:

Insightful discussions of how law enforcement and intelligence agencies operate on the internet
Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology
Explorations of how the internet has changed the world, for better and for worse
Engaging stories from Mikko's 30-year career in infosec

Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

Contents

Foreword: Jeff Moss xiii

Preface xvii

Saab 9000 Turbo xxi

The Good and the Bad of the Internet 1

Prehistoric Internet 2

The First Websites 5

Linux Is the World's Most Important System 7

iPhone vs. Supercomputer 10

Online Communities 11

Money Is Data 13

Codes All Around Us 14

Geopolitics 17

Security Tetris 21

Who Are We Fighting? 24

Schoolboys 24

Spammer 26

Professional Cybercrime Groups 28

Extremists 29

The Rolex 30

Malware—Then, Now, and in the Near Future 33

The History of Malware 34

Viruses on Floppies 34

Brain.A 35

File Viruses 43

Macro Viruses 43

Email Worms 45

Internet Worms 46

The Virus Wars 49

Web Attacks 51

Mobile Phone Viruses 51

Worms on Social Media 54

Smartphones and Malware 55

Law Enforcement Malware 57

Case R2D2 58

Cracking Passwords 59

When a Hacker Spilled Her Coffee 60

Ransomware Trojans 61

The History of Ransomware Trojans 61

Cryptolocker 64

Honest Criminals 65

Notpetya 65

Case Maersk 67

Wannacry 71

My Week with Wannacry 72

Targeted Ransomware Trojans 76

Ransomware Trojans v2 77

The Human Element 79

The Two Problems 80

The Heist 82

CEO Fraud 89

Touring the Headquarters 92

Protecting Company Networks 95

Zero Trust 100

Bug Bounties 101

Wi- Fi Terms of Use 110

Mikko's Tips 112

Mikko's Tips for the Startup Entrepreneur 114

Boat for Sale 118

What If the Network Goes Down? 121

Electrical Networks 122

Security in Factories 124

A Search Engine for Computers 126

Slammer 128

Hypponen's Law 130

Dumb Devices 132

Regulation 134

Car Software Updates 136

Online Privacy 137

Life Without Google 138

Murder Charges Never Expire 139

Is Google Listening to You? 142

Gorillas 143

Startup Business Logic 145

Biometrics 147

Antisocial Media 149

Online Influencing and Elections 151

Privacy Is Dead 153

Before and After Gmail 156

Encryption Techniques 160

Perfect Encryption 160

Unbreakable Encryption 161

Criminal Use of Encryption Systems 162

Data Is The New Uranium 166

CASE Vastaamo 168

Patient Registry 169

Technologies 170

Vastaamo.tar 171

Extortion Messages 173

The Hunt for the TAR File 175

Innocent Victims 177

Cryptocurrencies 179

The Value of Money 180

Blockchains 181

Blockchain Applications 182

Blockchains and Money 183

The Environmental Impacts of Bitcoin 185

Playing the Market 187

Ethereum, Monero, and Zcash 189

Nft 191

Bitcoin and Crime 193

Border Guards vs. Bitcoin 195

Technology, Espionage, and Warfare Online 199

Cyberweapons 200

Lunch Break at Google 201

Technology and Warfare 202

Under a False Flag 204

Concealability of Cyberweapons 205

The Fog of Cyberwar 207

Case Prykarpattyaoblenergo 211

Case Pyeongchang 213

Governments as Malware Authors 214

Russia and China 216

Case Stuxnet 217

Damage Coverage 226

Explosion at the White House 227

My Boycott of RSA, Inc 229

The Future 233

Artificial Intelligence 234

Wolverines 237

AI Will Take Our Jobs 238

Smart Malware 239

Metaverse 240

The Technology of Warfare 241

"You Are Under Arrest for a Future Murder" 242

Those Who Can Adapt Will Prosper 243

Tesla 245

Trends in Technology 247

Coda 249

Index 251

最近チェックした商品