StartGroepenDiscussieMeerTijdgeest
Doorzoek de site
Onze site gebruikt cookies om diensten te leveren, prestaties te verbeteren, voor analyse en (indien je niet ingelogd bent) voor advertenties. Door LibraryThing te gebruiken erken je dat je onze Servicevoorwaarden en Privacybeleid gelezen en begrepen hebt. Je gebruik van de site en diensten is onderhevig aan dit beleid en deze voorwaarden.

Resultaten uit Google Boeken

Klik op een omslag om naar Google Boeken te gaan.

Countdown to Zero Day: Stuxnet and the…
Bezig met laden...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (origineel 2014; editie 2014)

door Kim Zetter (Auteur)

LedenBesprekingenPopulariteitGemiddelde beoordelingAanhalingen
5193147,073 (4.06)5
Computer Technology. History. Military. Nonfiction. HTML:Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iranâ??s nuclear efforts and shows how its existence has ushered in a new age of warfareâ??one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mysteryâ??apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firmâ??s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the worldâ??s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnetâ??s planning, execution, and discovery, covering its genesis in the corridors of Bushâ??s White House and its unleashing on systems in Iranâ??and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside todayâ??s flourishing zero-day â??grey markets,â?ť in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alikeâ??and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetterâ??s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a
… (meer)
Lid:pollycallahan
Titel:Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Auteurs:Kim Zetter (Auteur)
Info:Crown (2014), Edition: 1st, 448 pages
Verzamelingen:Still to Finish, Government, Teen Books, Jouw bibliotheek, Verlanglijst, Aan het lezen, Te lezen, Gelezen, maar niet in bezit, Favorieten
Waardering:
Trefwoorden:finish-later, data, government

Informatie over het werk

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon door Kim Zetter (2014)

Bezig met laden...

Meld je aan bij LibraryThing om erachter te komen of je dit boek goed zult vinden.

Op dit moment geen Discussie gesprekken over dit boek.

» Zie ook 5 vermeldingen

1-5 van 32 worden getoond (volgende | toon alle)
"A new age of mass destruction will begin in an effort to close a chapter from the first age of mass destruction."
A dense (but engrossing) read, this is about Stuxnet, the game-changing virus/worm that signalled the age of cyberwarfare.
Since this is a true story (and not based on one), it becomes a drudgery to wade through the 'boring' parts, but it is all made up for in the last third of the work, which details how the world landscape was changed irrevocably (for the worse) through trying to sabotage Iran's nuclear program.
TL;DR - reads like an expanded magazine article series, read if you can withstand factual writing which looks to be techno-babble, but don't read it if you want some sort of 'excitement' in your 'plot'. ( )
  SidKhanooja | Sep 1, 2023 |
pick up on page 206
  pollycallahan | Jul 1, 2023 |
I would actually give this 4.5 stars if I could. It is a thorough and complex look at Stuxnet and the issues surrounding cyber warfare that reads almost like a thriller. It goes into technical detail without getting too bogged down. It can be occasionally difficult to follow but that may be unavoidable given the subject. I think the author does a good job of considering the consequences of opening up this Pandora's Box. ( )
  MarkMad | Jul 14, 2021 |
An excellent account of Stuxnet. As a subject matter expert employed in the field, I watched this intently as it unfolded, and was familiar with much of the material in the book, but still found it enjoyable and informative. For anyone who hasn't been following Stuxnet and related issues closely, this book would be an excellent introduction. Even without a technical background, it would be easy to follow the human and political implications.


(Second book I've read this year (audible audiobook, in this case, unabridged)) ( )
  octal | Jan 1, 2021 |
Nerd level 10! Great story. Some really good, deep investigative journalism. Quoted a lot froM Sanger book, so read that one as well. Very enjoyable. Described the hack with a level of detail that didnt overwhelm the non-computer science nerd. And a very impressive piece of malwaare that was built. Also liked that she talked a bit about the ethical implications of a virus like stuxnet. ( )
  bermandog | Sep 26, 2020 |
1-5 van 32 worden getoond (volgende | toon alle)
geen besprekingen | voeg een bespreking toe

» Andere auteurs toevoegen

AuteursnaamRolType auteurWerk?Status
Kim Zetterprimaire auteuralle editiesberekend
Munday, OliverOmslagontwerperSecundaire auteursommige editiesbevestigd
Je moet ingelogd zijn om Algemene Kennis te mogen bewerken.
Voor meer hulp zie de helppagina Algemene Kennis .
Gangbare titel
Oorspronkelijke titel
Alternatieve titels
Oorspronkelijk jaar van uitgave
Mensen/Personages
Belangrijke plaatsen
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Belangrijke gebeurtenissen
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Verwante films
Motto
Opdracht
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
For SC and for my parnets --- with love and grea gratitude, though gratitude is insufficient for all that you've done.
Eerste woorden
Citaten
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Once the rogue .DLL was in place, what it did was quite remarkable.     Whenever an engineer tried to send commands to a PLC, Stuxnet made sure its own malicious command code got sent and executed instead. But it didn’t just overwrite the original commands in a simple swap. Stuxnet increased the side of the code block and slipped its malicious code in at the front end. Then to make sure its malicious commands got activated instead of the legitimate ones, Stuxnet also hooked a core block of code on the PLC that was responsible for reading and executing commands. A lot of knowledge and skill were required to inject the code seamlessly in this way without “bricking” the PLCs (that is, causing them to seize up or become nonfunctional), but the attackers pulled it off beautifully.     The second part of the attack was even more ingenious. Before Stuxnet’s malicious commands went into action, the malware sat patiently on the PLC for about two weeks, sometimes longer, recording legitimate operations as the controller sent status reports back to monitoring stations. Then when Stuxnet’s malicious commands leapt into action, the malware replayed the recorded data back to operators to blind them to anything amiss on the machines – like a Hollywood heist film where the thieves insert a looped video clip into surveillance camera feeds. While Stuxnet sabotaged the PLC, it also disabled automated digital alarms to prevent safety systems from kicking in and halting whatever process the PLC was controlling it it sensed the equipment was entering a danger zone. Stuxnet did this by altering blocks of code known as OB35 that were part of the PLC’s safety system. These were used to monitor critical operations, such as the speed of a turbine the PLC was controlling. The blocks were generated every 100 milliseconds by the PLC so that safety systems could kick in quickly if a turbine began spinning out of control or something else went wrong, allowing the system or an operator to set off a kill switch and initiate a shutdown. But with Stuxnet modifying the data the safety system relied on, the system was blind to dangerous conditions and never had a chance to act.
Laatste woorden
Ontwarringsbericht
Uitgevers redacteuren
Auteur van flaptekst/aanprijzing
Oorspronkelijke taal
Informatie afkomstig uit de Engelse Algemene Kennis. Bewerk om naar jouw taal over te brengen.
Gangbare DDC/MDS
Canonieke LCC

Verwijzingen naar dit werk in externe bronnen.

Wikipedia in het Engels (3)

Computer Technology. History. Military. Nonfiction. HTML:Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iranâ??s nuclear efforts and shows how its existence has ushered in a new age of warfareâ??one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mysteryâ??apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firmâ??s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the worldâ??s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnetâ??s planning, execution, and discovery, covering its genesis in the corridors of Bushâ??s White House and its unleashing on systems in Iranâ??and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside todayâ??s flourishing zero-day â??grey markets,â?ť in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alikeâ??and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetterâ??s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a

Geen bibliotheekbeschrijvingen gevonden.

Boekbeschrijving
Haiku samenvatting

Deelnemer aan LibraryThing Vroege Recensenten

Kim Zetter's boek Countdown to Zero Day was beschikbaar via LibraryThing Early Reviewers.

Actuele discussies

Geen

Populaire omslagen

Snelkoppelingen

Waardering

Gemiddelde: (4.06)
0.5
1
1.5
2 3
2.5
3 22
3.5 6
4 43
4.5 7
5 34

Ben jij dit?

Word een LibraryThing Auteur.

 

Over | Contact | LibraryThing.com | Privacy/Voorwaarden | Help/Veelgestelde vragen | Blog | Winkel | APIs | TinyCat | Nagelaten Bibliotheken | Vroege Recensenten | Algemene kennis | 205,329,687 boeken! | Bovenbalk: Altijd zichtbaar