Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate.
Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world.
The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy.
What You Will Learn:
Who This Book Is for:
This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet.
The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.
Chris Murphy is a cybersecurity expert and pioneer in digital identity and secure network interaction. With over 25 years of experience in the field, Chris has worked with private organizations and government agencies, developing innovative solutions to eliminate vulnerabilities in network security. He is the inventor of EAID technology, a groundbreaking approach to direct user interaction, and has dedicated his career to addressing cybersecurity's most persistent challenges. This book is his effort to share these insights with a broader audience and offer actionable solutions to a broken system.
Chapter 1: The Myth of Mitigation.- Chapter 2: Public Access: The Original Flaw.- Chapter 3: The Legal and Economic Time Bomb of MFA Deception.- Chapter 4: The Pervasiveness of Cybersecurity Deception.- Chapter 5: Complicity Through Blind Conformity.- Chapter 6: The Failure of the Cybersecurity Education System.- Chapter 7: The Rise of Mitigation: Patching Over the Problem.- Chapter 8: The Failure to Look Beyond the Immediate Horizon.- Chapter 9: The Internet as a Crime Scene.- Chapter 10: Regulatory Failures and the Consequences of Inaction.- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis.- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy.- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution.- Chapter 14: Corporate Leadership's Role in Cybersecurity: The Cost of Complacency and the Call for Accountability.- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders.- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era.- Chapter 17: The Role of Digital IDs and Direct User Interaction.- Chapter 18: A Call for Integrity and Real Security.- Chapter 19: The Impact of AI on Cybersecurity.- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders.- Chapter 21: A New Era of Network Security Through Real Computer Science.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.