Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Digital deceptionhow public access a...
~
Murphy, Christopher.
Digital deceptionhow public access and false MFA broke the internet /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Digital deceptionby Christopher Murphy.
Reminder of title:
how public access and false MFA broke the internet /
Author:
Murphy, Christopher.
Published:
Berkeley, CA :Apress :2025.
Description:
xxii, 127 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
InternetSecurity measures.
Online resource:
https://doi.org/10.1007/979-8-8688-1227-9
ISBN:
9798868812279$q(electronic bk.)
Digital deceptionhow public access and false MFA broke the internet /
Murphy, Christopher.
Digital deception
how public access and false MFA broke the internet /[electronic resource] :by Christopher Murphy. - Berkeley, CA :Apress :2025. - xxii, 127 p. :ill., digital ;24 cm.
Chapter 1: The Myth of Mitigation -- Chapter 2: Public Access: The Original Flaw -- Chapter 3: The Legal and Economic Time Bomb of MFA Deception -- Chapter 4: The Pervasiveness of Cybersecurity Deception -- Chapter 5: Complicity Through Blind Conformity -- Chapter 6: The Failure of the Cybersecurity Education System -- Chapter 7: The Rise of Mitigation: Patching Over the Problem -- Chapter 8: The Failure to Look Beyond the Immediate Horizon -- Chapter 9: The Internet as a Crime Scene -- Chapter 10: Regulatory Failures and the Consequences of Inaction -- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis -- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy -- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution -- Chapter 14: Corporate Leadership's Role in Cybersecurity: The Cost of Complacency and the Call for Accountability -- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders -- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era -- Chapter 17: The Role of Digital IDs and Direct User Interaction -- Chapter 18: A Call for Integrity and Real Security -- Chapter 19: The Impact of AI on Cybersecurity -- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders -- Chapter 21: A New Era of Network Security Through Real Computer Science.
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate. Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world. The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy. What You Will Learn: Gain a deep understanding of the fundamental flaw in cybersecurity, particularly the impact of public access to secure networks and the deception inherent in current MFA practices. Recognize how various actors, knowingly or unknowingly, have contributed to the current cybersecurity crisis. Implement real solutions with actionable strategies based on real computer science to address and correct these vulnerabilities, paving the way for a more secure digital future. A revolutionary concept of Direct User Interaction and Digital IDs, as opposed to more traditional cybersecurity approaches like Zero Trust or perimeter security. Who This Book Is for: This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet. The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.
ISBN: 9798868812279$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-1227-9doiSubjects--Topical Terms:
192260
Internet
--Security measures.
LC Class. No.: QA76.9.A25 / M87 2025
Dewey Class. No.: 005.8
Digital deceptionhow public access and false MFA broke the internet /
LDR
:04942nmm a2200349 a 4500
001
682882
003
DE-He213
005
20250710135012.0
006
m d
007
cr nn 008maaau
008
251209s2025 cau s 0 eng d
020
$a
9798868812279$q(electronic bk.)
020
$a
9798868812262$q(paper)
024
7
$a
10.1007/979-8-8688-1227-9
$2
doi
035
$a
979-8-8688-1227-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
M87 2025
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
M978 2025
100
1
$a
Murphy, Christopher.
$3
365824
245
1 0
$a
Digital deception
$h
[electronic resource] :
$b
how public access and false MFA broke the internet /
$c
by Christopher Murphy.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2025.
300
$a
xxii, 127 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Myth of Mitigation -- Chapter 2: Public Access: The Original Flaw -- Chapter 3: The Legal and Economic Time Bomb of MFA Deception -- Chapter 4: The Pervasiveness of Cybersecurity Deception -- Chapter 5: Complicity Through Blind Conformity -- Chapter 6: The Failure of the Cybersecurity Education System -- Chapter 7: The Rise of Mitigation: Patching Over the Problem -- Chapter 8: The Failure to Look Beyond the Immediate Horizon -- Chapter 9: The Internet as a Crime Scene -- Chapter 10: Regulatory Failures and the Consequences of Inaction -- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis -- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy -- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution -- Chapter 14: Corporate Leadership's Role in Cybersecurity: The Cost of Complacency and the Call for Accountability -- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders -- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era -- Chapter 17: The Role of Digital IDs and Direct User Interaction -- Chapter 18: A Call for Integrity and Real Security -- Chapter 19: The Impact of AI on Cybersecurity -- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders -- Chapter 21: A New Era of Network Security Through Real Computer Science.
520
$a
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate. Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world. The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy. What You Will Learn: Gain a deep understanding of the fundamental flaw in cybersecurity, particularly the impact of public access to secure networks and the deception inherent in current MFA practices. Recognize how various actors, knowingly or unknowingly, have contributed to the current cybersecurity crisis. Implement real solutions with actionable strategies based on real computer science to address and correct these vulnerabilities, paving the way for a more secure digital future. A revolutionary concept of Direct User Interaction and Digital IDs, as opposed to more traditional cybersecurity approaches like Zero Trust or perimeter security. Who This Book Is for: This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet. The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.
650
0
$a
Internet
$x
Security measures.
$3
192260
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
Privacy.
$3
268519
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-1227-9
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000255940
電子館藏
1圖書
電子書
EB QA76.9.A25 M978 2025 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/979-8-8688-1227-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login