Not only does this book show you how hackers and others commit cyber-attacks, but how to secure your system to protect it from these cyber-attacks.
Do you wonder why anyone would want to commit a cyber-attack? Quoted directly from the book, in chapter one:
“The exploitation of networks and technologies for gathering information is now commonplace on the Internet, and targeted cyber attacksare a common weapon for subverting the integrity of Internet operations.
These attacks steal intellectual property, conduct cyber espionage,
damage critical infrastructure and create uncertainty among
users. They can achieve both tactical and strategic goals across the
Internet without requiring any physical encroachment. It is clear that
targeted attacks provide a tactical advantage that can play a significant
role in future cyber wars.” (Sood and Enbody 2014)
With so much at stake, you would think that more people would seek to learn more about these attacks in order to protect themselves. In the case of commerce, it would also protect their end users. Is your online shopping or even your email accounts safe? What about your online banking? There are so many questions and sometimes too few answers. Yet, there are people like Sood and Enbody among others, who have the answers. As long as we take the time to listen, read and learn. No books in the world will be of any value if we refuse to take the time to read, learn and follow the suggestions the authors give us.
1. Targeted Cyber Attacks Sood & Enbody 2014