Digital Deception : How Public Access and False MFA Broke the Internet

Digital Deception : How Public Access and False MFA Broke the Internet

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 127 p.
  • 言語 ENG
  • 商品コード 9798868812262

Full Description

A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate.

Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world.

The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy.

What You Will Learn:

Gain a deep understanding of the fundamental flaw in cybersecurity, particularly the impact of public access to secure networks and the deception inherent in current MFA practices.
Recognize how various actors, knowingly or unknowingly, have contributed to the current cybersecurity crisis.
Implement real solutions with actionable strategies based on real computer science to address and correct these vulnerabilities, paving the way for a more secure digital future.
A revolutionary concept of Direct User Interaction and Digital IDs, as opposed to more traditional cybersecurity approaches like Zero Trust or perimeter security.

Who This Book Is for:

This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet.

The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.

Contents

Chapter 1: The Myth of Mitigation.- Chapter 2: Public Access: The Original Flaw.- Chapter 3: The Legal and Economic Time Bomb of MFA Deception.- Chapter 4: The Pervasiveness of Cybersecurity Deception.- Chapter 5: Complicity Through Blind Conformity.- Chapter 6: The Failure of the Cybersecurity Education System.- Chapter 7: The Rise of Mitigation: Patching Over the Problem.- Chapter 8: The Failure to Look Beyond the Immediate Horizon.- Chapter 9: The Internet as a Crime Scene.- Chapter 10: Regulatory Failures and the Consequences of Inaction.- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis.- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy.- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution.- Chapter 14: Corporate Leadership's Role in Cybersecurity: The Cost of Complacency and the Call for Accountability.- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders.- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era.- Chapter 17: The Role of Digital IDs and Direct User Interaction.- Chapter 18: A Call for Integrity and Real Security.- Chapter 19: The Impact of AI on Cybersecurity.- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders.- Chapter 21: A New Era of Network Security Through Real Computer Science.

最近チェックした商品