Installieren Sie die genialokal App auf Ihrem Startbildschirm für einen schnellen Zugriff und eine komfortable Nutzung.
Tippen Sie einfach auf Teilen:
Und dann auf "Zum Home-Bildschirm [+]".
Bei genialokal.de kaufen Sie online bei Ihrer lokalen, inhabergeführten Buchhandlung!
Cyberattacks are nothing particularly new to the world and Ukraine had suffered many such attacks by Russia over recent years. Russia had knowingly been exploiting Ukraine's digital vulnerabilities as a proving ground for nearly a decade. Malware such as Sandworm and BlackEnergy had caused untold damage to the Ukrainian population and government previously, which allowed Russia to perfect cyberattacks for further, more global events. Russia had been planting cyber sleeper digital cells for years, especially in the US and the UK. Then, coincidently, the week after the Chinese Winter Olympic games had finished, Russia launched an all-out cyber offensive against 70 Ukrainian government websites. Owing to these being poorly-and insecurely-maintained, they toppled one by one, causing havoc and disruption to the Ukrainian government and to Ukraine's critical infrastructure. As Q said in James Bond: 'I can do more damage by breakfast sipping my Earl Grey tea with my keyboard than you ever can in the field.' Sadly, Q was right, as we witness daily. The keyboard and mouse have indeed become mightier than the sword. The barrage of cyberattacks against Ukraine constitutes the first cyberwar by one nation against another. This attack crossed a very thin red line. That line had the hallmarks of a nation state, but had until now been confined to cyber criminal activities, immaterial of whom the perpetrators were. This, however, was now war. The cyberwar was simply a precursor, the softening of a country that would precede a kinetic war in which tens of thousands of people would lose their lives. This war was the first war for nearly 80 years that rang out deathly klaxons across Europe and the world. Digital Blood on Their Hands addresses the issues that the digital world has created, covering the culpability, causal links and even liabilities that go towards these war crime atrocities, often too frightening to believe and also too compelling to dismiss. It tells a side to the world's first ever cyberwar that you would never otherwise see or possibly hear about.
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts. After publishing his first book, Stuxnet to Sunburst and Ransomware and Cybercrime, Andrew was subsequently made a Fellow of the Cyber Theory Institute and acknowledged as a Thought Leader in the field of Public Key Infrastructure, Domain Name System, both the fundamental basic of all security. He has also been named as one of the worlds leading 30 Cyber Security Experts by The European Institute of Risk. Other books by this author: Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare https://www.routledge.com/Stuxnet-to-Sunburst-20-Years-of-Digital-Exploitation-and-Cyber-Warfare/Jenkinson/p/book/9781032068503 Ransomware and Cybercrime https://www.routledge.com/Ransomware-and-Cybercrime/Jenkinson/p/book/9781032235509
Preface. Author. Part I History. Chapter 1 The History of War and Cyber Warfare. Chapter 2 The History of Cybersecurity. Part II Technology. Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT: Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III Examples of Previous Attacks and Insecurities. Chapter 8 US Government Security Failings. Chapter 9 UK Government Security Failings. Chapter 10 Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter 12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13 Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine. Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down. Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond. Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21 Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION. AFTERWORD. INDEX.
Dieses eBook wird im PDF-Format geliefert und ist mit einem Adobe Kopierschutz (DRM) versehen. Sie können dieses eBook mit allen Geräten lesen, die das PDF-Format und den Adobe Kopierschutz (DRM) unterstützen.
Zum Beispiel mit den folgenden Geräten:
• tolino Reader
Laden Sie das eBook direkt über den Reader-Shop auf dem tolino herunter oder übertragen Sie das eBook auf Ihren tolino mit einer kostenlosen Software wie beispielsweise Adobe Digital Editions.
• Sony Reader & andere eBook Reader
Laden Sie das eBook direkt über den Reader-Shop herunter oder übertragen Sie das eBook mit der kostenlosen Software Sony READER FOR PC/Mac oder Adobe Digital Editions auf ein Standard-Lesegeräte mit epub- und Adobe DRM-Unterstützung.
• Tablets & Smartphones
Möchten Sie dieses eBook auf Ihrem Smartphone oder Tablet lesen, finden Sie hier unsere kostenlose Lese-App für iPhone/iPad und Android Smartphone/Tablets.
• PC & Mac
Lesen Sie das eBook direkt nach dem Herunterladen mit einer kostenlosen Lesesoftware, beispielsweise Adobe Digital Editions, Sony READER FOR PC/Mac oder direkt über Ihre eBook-Bibliothek in Ihrem Konto unter „Meine eBooks“ - „online lesen“.
Schalten Sie das eBook mit Ihrer persönlichen Adobe ID auf bis zu sechs Geräten gleichzeitig frei.
Bitte beachten Sie, dass die Kindle-Geräte das Format nicht unterstützen und dieses eBook somit nicht auf Kindle-Geräten lesbar ist.