Counting from Zero

By Alan B Johnston

Can a safety specialist shop the web from a catastrophic 0 day cyber assault by means of a community of zombie desktops, referred to as a botnet? At what fee?

"Credible and plausible, this tale is advised through a topic specialist. i couldn't wait to determine what occurred next." 
- Vint Cerf, net pioneer

"The danger to the web from worms, viruses, botnets, and zombie desktops is genuine, and transforming into. Counting from 0 is a brilliant approach to arise to hurry at the alarming scenario, and Johnston attracts you in along with his tale and plausible forged of characters."
- Phil Zimmermann, writer of beautiful strong privateness (PGP) the main established electronic mail encryption program

Today, each machine hooked up to the web is lower than consistent assault from viruses, worms, port scans, and unsolicited mail. defense execs regularly struggle to comprise newly unleashed cyber assaults, often called 'zero day' assaults, in simple terms to have new assaults introduced. thousands of pcs have already succumbed, and, with out their owner's wisdom, became slave desktops - remotely managed 'zombies'. below the regulate of equipped crime and sponsored by means of overseas governments, those pcs are morphing into collections identified within the as botnets, brief for robotic networks.

Internet safety professional Mick O'Malley is the single person who acknowledges the turning out to be danger of the final word 0 day assault on the net from an enormous botnet, and his targeted hacker talents and community of co-workers let him to struggle again. extra cyber prep than cyber punk, Mick makes use of real-life instruments and methods to encrypt all his communications, and makes use of those talents to wreck the encryption utilized by the botnet. Mick makes use of encryption on a private point, too, having a number of passports and a number of names and identities. whereas crisscrossing the globe within the air, on land, and at sea investigating the risk, Mick turns into the objective of assaults on his acceptance, his identification, and finally his life.

Along the best way, Mick meets Kateryna Petrescu, a stunning Romanian firewall professional. Mick's allure to Kateryna develops as they paintings heavily jointly and percentage the buzz and chance. Why is the govt following Mick and attempting to intercept his communications? Can he cease the 0 day assault sooner than it's unleashed? what is going to be the associated fee to Mick for his unmarried mindedness?

Unfolding throughout 3 continents, the recent cybercrime secret "Counting from 0" provides a pragmatic insider's view of the thrust and parry international of computing device safeguard and cryptography, and the very actual risk of botnets.

Show description

Quick preview of Counting from Zero PDF

Similar Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number 1 manhattan occasions bestseller opposed to All Enemies, former presidential consultant and counter-terrorism specialist Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new overseas conflict—Cyber battle! each involved American may still learn this startling and explosive booklet that gives an insider’s view of White residence ‘Situation Room’ operations and consists of the reader to the frontlines of our cyber protection.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling desktop defense book--fully increased and updated"Right now you carry on your hand some of the most winning protection books ever written. instead of being a sideline player, leverage the dear insights Hacking uncovered 6 presents to assist your self, your organization, and your nation struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Advance and enforce a good end-to-end protection software Today’s complicated global of cellular systems, cloud computing, and ubiquitous information entry places new protection calls for on each IT specialist. details protection: the entire Reference, moment version (previously titled community safeguard: the entire Reference) is the one finished publication that gives vendor-neutral info on all points of data security, with a watch towards the evolving probability panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State of the art innovations for locating and solving serious defense flaws toughen your community and sidestep electronic disaster with confirmed concepts from a group of defense specialists. thoroughly up to date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's instruction manual, Fourth variation explains the enemy’s present guns, talents, and strategies and gives field-tested treatments, case reviews, and ready-to-deploy trying out labs.

Additional resources for Counting from Zero

Show sample text content

While requested for his company card, he often mumbled whatever approximately discovering his public key on the net. “Thank you, name me Mick. could I name you Vince? So, your organization makes modern-day Leyden jars? ” Mick started, pertaining to the 1st electricity garage units, named for town of Leiden within the Netherlands, and utilized by the early experimenters with electrical energy, together with Ben Franklin. whilst he first heard the identify of the corporate, Mick recalled a comic strip of tall lightning rods connected by means of wires to a financial institution of huge foil-covered glass jars. Leyden jars have been the forerunner of latest digital capacitors, and eventually reminiscence garage units utilized by all computational units at the present time. successfully, Ben Franklin labored at the first unmarried bit RAM (Random entry reminiscence) garage units. “Yes, we do make strength garage structures. permit me offer you a bit heritage at the corporation. ” Vince started and proceeded to recite the publicly on hand info that Mick had already dedicated to reminiscence. Vince then paused and persevered. “We are very attracted to getting your aid with an issue that we're having. Our servers were attacked, and a few of them compromised. The signature seems to be person who others have not obvious earlier than. a couple of different specialists have drawn a clean. ” Mick suppressed a smirk and the urge to invite if he have been conversing approximately Miles, his co-panelist. He will be capable of finding out later. “At your earliest comfort, we need you to come back out to New Mexico and begin paintings. i have had a typical agreement drawn up yet could not discover a fax quantity or postal handle for you. ” holding his countenance, Mick requested for Vince's admin touch info so he may be in contact approximately constructing a safe shared rfile server for the agreement and different felony and technical records. “By the best way, in order that you're not stunned, i will be undertaking a degree 2 heritage fee on you. ” Mick started. “I will count on whatever comparable from you, except you will have executive clearance, within which case you'll easily ask them approximately me,” Mick defined. He had his personal mechanism for studying whilst a person was once investigating him, so he continuously used to be up entrance together with his consumers in case they'd related mechanisms. One could not be too cautious nowadays, Mick mused, then considered a few of his much more paranoid acquaintances, and amended the idea to in general one could not be too cautious. The dialog waned and an appropriate day weeks away was once selected for Mick's stopover at to New Mexico, after his journey to Seattle the next week. at the stroll again to the convention, Mick stopped to check a bike parked at the sidewalk. in the beginning, he had hassle making a choice on even the producer, because the motorcycle have been seriously custom-made as used to be universal in Nihon. It had a brand new fuel tank, fenders, and seat with all branding got rid of. Even the wheelbase have been prolonged within the rear swing arm. He pointed out a standard Yamaha kind of carburetor, broad profile tire, and was once in a position to bet the version, giving him a few delight.

Download PDF sample

Rated 4.64 of 5 – based on 26 votes