Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The perfect weapon : war, sabotage, and fear in the cyber age
Sanger D., Crown Publishing Group, New York, NY, 2018. 384 pp. Type: Book (978-0-451497-89-5)
Date Reviewed: Jun 18 2020

A thriller-type story, albeit one that happens in the real world, this book is about those parts of the Internet filled with people trying to exploit it--all you need is a computer and Internet access. Just the fact that any residential modem is bombarded with possible attacks from all over the world on a continuous basis is proof that individuals or state actors are constantly trying to exploit it. In these cases, a home router/firewall is often thwarting the attacks.

The book starts with state-to-state cyberwarfare with Russia and Ukraine. There are many agencies--some of them are the Central Intelligence Agency (CIA), the Federal Bureau of Investigation (FBI), the White House, US research laboratories, and Air Force bases--and their interrelations are explored. The international angles of countries like the US, Israel, Iran, and Iraq, including the depth of the cyberwar that takes place among countries, is mind-boggling. The origin and detailed operations behind Stuxnet are explored in great detail.

A significant portion of the book is also devoted to Edward Snowden, WikiLeaks, and the National Security Agency (NSA) and how the whole saga unfolded. Post-Snowden security measures are also covered in detail. The book weaves many different episodes together that are not always related to each other. After the Snowden episode, for example, the author discusses North Korea. The intent of the book, however, is not to have a single story but to weave together common themes to demonstrate that cybersecurity is the perfect weapon of modern times.

The author, a New York Times journalist, has perfect sources at many places, whether it is the government or Silicon Valley. Sanger’s extensive set of sources and interviews has led to this unfolding of stories. An awareness of behind-the-scenes happenings is crucial to protecting nation states, and corporate companies have a big part to play as well.

More reviews about this item: Amazon

Reviewer:  Naga Narayanaswamy Review #: CR146997 (2011-0252)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Government (J.1 ... )
 
 
Security, Integrity, And Protection (H.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Security of random data perturbation methods
Muralidhar K., Sarathy R. ACM Transactions on Database Systems 24(4): 487-493, 1999. Type: Article
Apr 1 2000
Towards a configurable security architecture
Olivier M. Data Engineering 38(2): 121-145, 2001. Type: Article
Apr 17 2002
A propositional policy algebra for access control
Wijesekera D., Jajodia S. ACM Transactions on Information and System Security 6(2): 286-325, 2003. Type: Article
May 29 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy