Book Review: Inside Cyber Warfare: Mapping the Cyber Underworld

By  

You'll ponder questions like "What does weaponizing malware really mean?" You'll start seeing the connections between a DoS (denial of service) attack against Twitter and an attack on the Brazilian power grid.

You'll start worrying about all those pirated and unpatched Windows installations in Africa and start asking yourself what kind of botnet attacks could be initiated from them.

Chapter 4 by Matthew Sklerov was particularly stimulating. It delves into various models of unconventional attack and the criteria for determining whether an attack should be viewed as an "armed attack" -- severity, immediacy, directness, invasiveness, measurability and presumptive legitimacy.

"Inside Cyber Warfare" is no easy read, It's both intense and probing. It gives the reader a grasp on the enormity of the threat and the complexity of the problem posed by organized and motivated hackers. You'll close this book with enough insight to make you see the outline of the problem like a huge shadow hovering over the Internet. This absolutely fascinating book will make good security all the more meaningful and important.

I left this book both fascinated and scared. This is not your grandfather's Internet.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness