Blog ini membicarakan soal buku, bahasa dan dunia penerbitan secara khusus. Ini sebagai dedikasi kecintaan saya terhadap buku dan ilmu. Semoga bermanfaat untuk semua. Dalam masa yang sama ia juga merangkumi kembara kerjaya dan persoalan kehidupan.

I have more than sixty books on internet and security issues (on last count). Most of them are my reference books that be used for my writing a couple a years ago and for the purpose of review. A few of the books are for my own reading to fulfill my needs of knowledge. 

I like this book, about cyber threats and hackers activity. It’s among my favourite subjects. In today's electronic age, the threat of cyber attacks is great. For any organization with information-based assets, the deadliest weapons can come in the form of a keyboard, mouse, or personal computer.

With hacking attacks and computer-based crimes increasing both in frequency and degree of seriousness, it's clear that information warfare is real and companies must protect themselves in order to survive. But how do you avoid getting caught in the crossfire of these attacks and how do you prepare when the electronic future is uncertain?


The answers can be found inside Information Warfare: How To Survive Cyber Attacks from recognized security expert and information technology consultant Michael Erbschloe.


This revealing book explores the impact of information warfare and the disruption and damage it can cause to governments, corporations, and commercial Web sites. Is it possible for a small number of people to cause millions of dollars worth of economic destruction from a computer?

Through the use of scenarios and profiles of the cyber-terrorist subculture, you'll learn practical defense strategies for protecting your company or ecommerce site from cyber attacks.

The book also examines the steps that governments around the world need to take in order to combat the advanced skill levels of some of the most dangerous cyber-criminals today. Whether you're responsible for making technology decisions that affect your company's future, or interested in computer security in general, you won't find a more accurate and up-to-date book covering the emerging field of information warfare.

In recent news, al-Jazeera reported that Google's changed stance on China was triggered by a sophisticated computer attack recently orchestrated from within the country, targeting the company and at least 20 others from the internet, financial services, technology, media and chemical industries.

The report says Google has said it may shut down its China operations in protest against government censorship of its search results.

The announcement by the internet search giant, which represents a major shift in policy, follows a recent hacking incident that appeared to target the accounts of activists using its electronic mail system, Gmail.

Another threat, according to Google, is “phishing” activities. As part of its investigation into the cyber attack, the company said it stumbled onto another more successful scam, in which dozens of activists in the US, Europe and China fighting the Chinese government's policies fell prey to ruses commonly known as "phishing" or malware.

Matt Furman, a Google spokesman, declined to say whether the company suspected the involvement of the Chinese government in the attacks.

"Phishing" involves malicious emails urging the recipients to open an attachment or visit a link that they're duped into believing comes from a friend or legitimate company. Clicking on such a link installs malware, or malicious software, on to computers, which can be used as a surveillance tool to steal passwords and unlock email accounts.

0 comments:


Photobucket
top