語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Digital deceptionhow public access a...
~
Murphy, Christopher.
Digital deceptionhow public access and false MFA broke the internet /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Digital deceptionby Christopher Murphy.
其他題名:
how public access and false MFA broke the internet /
作者:
Murphy, Christopher.
出版者:
Berkeley, CA :Apress :2025.
面頁冊數:
xxii, 127 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
InternetSecurity measures.
電子資源:
https://doi.org/10.1007/979-8-8688-1227-9
ISBN:
9798868812279$q(electronic bk.)
Digital deceptionhow public access and false MFA broke the internet /
Murphy, Christopher.
Digital deception
how public access and false MFA broke the internet /[electronic resource] :by Christopher Murphy. - Berkeley, CA :Apress :2025. - xxii, 127 p. :ill., digital ;24 cm.
Chapter 1: The Myth of Mitigation -- Chapter 2: Public Access: The Original Flaw -- Chapter 3: The Legal and Economic Time Bomb of MFA Deception -- Chapter 4: The Pervasiveness of Cybersecurity Deception -- Chapter 5: Complicity Through Blind Conformity -- Chapter 6: The Failure of the Cybersecurity Education System -- Chapter 7: The Rise of Mitigation: Patching Over the Problem -- Chapter 8: The Failure to Look Beyond the Immediate Horizon -- Chapter 9: The Internet as a Crime Scene -- Chapter 10: Regulatory Failures and the Consequences of Inaction -- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis -- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy -- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution -- Chapter 14: Corporate Leadership's Role in Cybersecurity: The Cost of Complacency and the Call for Accountability -- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders -- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era -- Chapter 17: The Role of Digital IDs and Direct User Interaction -- Chapter 18: A Call for Integrity and Real Security -- Chapter 19: The Impact of AI on Cybersecurity -- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders -- Chapter 21: A New Era of Network Security Through Real Computer Science.
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate. Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world. The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy. What You Will Learn: Gain a deep understanding of the fundamental flaw in cybersecurity, particularly the impact of public access to secure networks and the deception inherent in current MFA practices. Recognize how various actors, knowingly or unknowingly, have contributed to the current cybersecurity crisis. Implement real solutions with actionable strategies based on real computer science to address and correct these vulnerabilities, paving the way for a more secure digital future. A revolutionary concept of Direct User Interaction and Digital IDs, as opposed to more traditional cybersecurity approaches like Zero Trust or perimeter security. Who This Book Is for: This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet. The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.
ISBN: 9798868812279$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-1227-9doiSubjects--Topical Terms:
192260
Internet
--Security measures.
LC Class. No.: QA76.9.A25 / M87 2025
Dewey Class. No.: 005.8
Digital deceptionhow public access and false MFA broke the internet /
LDR
:04942nmm a2200349 a 4500
001
682882
003
DE-He213
005
20250710135012.0
006
m d
007
cr nn 008maaau
008
251209s2025 cau s 0 eng d
020
$a
9798868812279$q(electronic bk.)
020
$a
9798868812262$q(paper)
024
7
$a
10.1007/979-8-8688-1227-9
$2
doi
035
$a
979-8-8688-1227-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
M87 2025
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
M978 2025
100
1
$a
Murphy, Christopher.
$3
365824
245
1 0
$a
Digital deception
$h
[electronic resource] :
$b
how public access and false MFA broke the internet /
$c
by Christopher Murphy.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xxii, 127 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Myth of Mitigation -- Chapter 2: Public Access: The Original Flaw -- Chapter 3: The Legal and Economic Time Bomb of MFA Deception -- Chapter 4: The Pervasiveness of Cybersecurity Deception -- Chapter 5: Complicity Through Blind Conformity -- Chapter 6: The Failure of the Cybersecurity Education System -- Chapter 7: The Rise of Mitigation: Patching Over the Problem -- Chapter 8: The Failure to Look Beyond the Immediate Horizon -- Chapter 9: The Internet as a Crime Scene -- Chapter 10: Regulatory Failures and the Consequences of Inaction -- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis -- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy -- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution -- Chapter 14: Corporate Leadership's Role in Cybersecurity: The Cost of Complacency and the Call for Accountability -- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders -- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era -- Chapter 17: The Role of Digital IDs and Direct User Interaction -- Chapter 18: A Call for Integrity and Real Security -- Chapter 19: The Impact of AI on Cybersecurity -- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders -- Chapter 21: A New Era of Network Security Through Real Computer Science.
520
$a
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate. Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world. The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy. What You Will Learn: Gain a deep understanding of the fundamental flaw in cybersecurity, particularly the impact of public access to secure networks and the deception inherent in current MFA practices. Recognize how various actors, knowingly or unknowingly, have contributed to the current cybersecurity crisis. Implement real solutions with actionable strategies based on real computer science to address and correct these vulnerabilities, paving the way for a more secure digital future. A revolutionary concept of Direct User Interaction and Digital IDs, as opposed to more traditional cybersecurity approaches like Zero Trust or perimeter security. Who This Book Is for: This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet. The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.
650
0
$a
Internet
$x
Security measures.
$3
192260
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
Privacy.
$3
268519
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-1227-9
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000255940
電子館藏
1圖書
電子書
EB QA76.9.A25 M978 2025 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-1227-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入