Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter, PDF 0770436196

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

  • Title: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
  • Autor: Kim Zetter
  • Publisher (Publication Date): Crown; 1st edition (November 11, 2014)
  • Language: English
  • ISBN-10: | 0770436196
  • ISBN-13: | 978-0770436193
  • File Format: EPUB, PDF

 
Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

No reviews

Comments:

I really liked this read. A few months ago, I got interested in all of what went down with the Stuxnet virus and was looking for something that would explain the events surrounding it and how it worked. This book did a great job in both capacities. It was entertaining and quite informative not only about the virus itself but also the culture of exploits seekers (think: those who try to find vulnerabilities in software). It also went into detail about the history of attacks on industrial machinery and the hypothetical concerns that are present in the future of this threat given the current infrastructure in place and what’s being done on a public level to mitigate the risks. I’d recommend it for anyone that wants a thorough investigation and an interesting look at the culture involved in finding, exploiting and thwarting vulnerabilities on a worldwide scale.


Related posts

Pro Functional PHP Programming: Application Development Strategies for Performance Optimization, Concurrency, Testability, and Code Brevity by Rob Aley, PDF 1484229576
Implementation and classification of anomalous detection by Mukti Kundu, PDF 3330080477
Big Data, Big Challenges in Evidence-Based Policy Making (Coursebook) by H. Kumar Jayasuriya, PDF 1634594525
IT Essentials Course Booklet, Version 6 (Course Booklets) by Cisco Networking Academy, PDF 1587133563
Methods based on ontologies for information resources processing by Vasyl Lytvyn, PDF 3659899054
iOS eCommerce App Development with Parse by Liangjun Jiang, PDF 1484213181

Leave a Reply

Your email address will not be published. Required fields are marked *