Contents |
The worldwide explosion of personal computers and the afterthought that is security -- 9/11 and the creation of mass data collection in the name of security ... -- PRISM, Project Aurora, and early digital offensive capability -- Stuxnet to zero days -- Hush puppies, flying pigs, growing tensions, and Easter eggs -- Root cause analysis, Aston Martins and Concorde -- The office of personnel management and Equifax breaches -- Marriott and cyber insurance : a fragile prop -- From boom to bust, or from $3 billion flotation to $1 sale in 18 months -- Did someone say critical national infrastructure and nuclear power -- Cyberattack fatigue -- Not secure, the Vatican and healthcare -- Australia's frustration with China and assissting the FBI -- Blackbaud and third-party trust -- Stuxnet to sunburst -- www(.)avsvmcloud(.)com (SolarWinds attack) the modus operandi for attacks since Stuxnet -- The TAO, quantum insert, and own goals -- The COVID-19 breaches -- Should we be concerned or worried? Our government and agencies have got this -- Making the matter far worse (IoT and 5G) -- NSA obsolete TLS protocols -- What does the future hold? By asking better questions, we will get better answers and take better action. |
Abstract |
"Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds."-- Provided by publisher |
General note | Includes index. |
Biographical note | Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts. |
Source of description | Print version record. |
Issued in other form | Print version: Jenkinson, Andrew. Stuxnet to sunburst. Boca Raton : CRC Press, 2021 9781032068497 |
Genre/form | Electronic books. |
Genre/form | History. |
ISBN | 9781000464825 (electronic bk.) |
ISBN | 1000464822 (electronic bk.) |
ISBN | 9781003204145 (electronic bk.) |
ISBN | 1003204147 (electronic bk.) |
ISBN | 9781000464870 (electronic bk. ; EPUB) |
ISBN | 1000464873 (electronic bk. ; EPUB) |
Stock number | 9781003204145 Taylor & Francis |