|
|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
Conversations in Cyberspace is a collection of insights on the
current state of security and privacy in the Internet world. The
book contains a brief introduction to some of the most used
open-source intelligence (OSINT) tools and a selection of
interviews with some of the key figures in industrial control
systems (ICS), advanced persistent threat (APT) and online/deep web
members organizations. It aims to be an introduction to the
relationships between security, OSINT and the vast and complex
world hiding in the deep web. The information provided will be
beneficial to security professionals and system administrators
interested in exploring today's concerns in database design,
privacy and security-by-design, and deep web members organizations,
including Cicada 3301, the Unknowns, Anonymous, and more.
In September 2010, media reports emerged about a new form of cyber
attack that appeared to target Iran, although the actual target, if
any, is unknown. Through the use of thumb drives in computers that
were not connected to the Internet, a malicious software program
known as Stuxnet infected computer systems that were used to
control the functioning of a nuclear power plant. Once inside the
system, Stuxnet had the ability to degrade or destroy the software
on which it operated. This book examines the discovery of the
Stuxnet worm which has raised several issues for Congress,
including the effect on national security, what the government's
response should be, whether an international treaty to curb the use
of malicious software is necessary, and how such a treaty could be
implemented.
|
|