Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Big breaches: cybersecurity lessons for everyone
Daswani N., Elbayadi M., Apress, New York, NY, 2021. 476 pp. Type: Book (978-1-484266-54-0)
Date Reviewed: Mar 31 2023

This large work begins with an introductory preface that provides historical perspective on cybercriminals and introduces the authors and the basic tenets of the book. The work is divided into two broad parts: the first gives detailed descriptions, root cause analyses, and key lessons learned for several of the largest data breaches of the recent past; and the second part provides advice on how to achieve effective security for information and communications technology (ICT) systems. Crucially, the language of the book aims to be understood by general management, and not just technical specialists.

Chapter 1 discusses the high-level root causes and attack methods used in recent major data breaches that have allowed criminals to break into so many organizations, and covers both systemic organizational issues and technical issues. The following seven chapters of Part 1 each describe, in some detail, large recent cyberattacks, including the Capital One breach of 2019, the Marriott breach of 2018, and the Equifax breach of 2017, along with successful attacks on Facebook, Yahoo, Target, JPMorgan Chase, and the US Office of Personnel Management. In each case, the vulnerabilities and mechanisms that led to the successful breaches are discussed; importantly, the root causes are succinctly reduced in simple terms. Details of what was stolen and the overall impact of the attacks are explained, along with discussion of how the attacks may have been prevented. The discussion is interesting and in particular notes that, at the time of the attack, the victim organizations were largely compliant to industry security standards.

The nine chapters of Part 2 provide Daswani and Elbayadi’s recommendations on processes and habits to help organizations secure their data assets, similar to the recommendations of Sloan and Warner [1]. Technology, processes, and simple routine habits that can help protect ICT systems are discussed. Chapter 9 describes seven habits that, in the authors’ opinion, can deliver highly effective security. Chapter 10 provides advice to board-level management on security risk management, largely without the use of technical jargon, while chapter 11 provides similar advice for technology and security leaders. Chapters 12 and 13 discuss technical defenses against malware and phishing attacks, focusing on addressing the root causes of breaches. The need for assessing the security posture of suppliers, secure software development practices, the patching and updating of software, and vulnerability management processes are covered, along with the need for security education for employees. Chapter 14 broadens the focus to look at recent security investment trends and suggests areas of future funding. Chapter 15 provides advice to consumers, whether they are simply using online data or providing their personal information to organizations. Defensive habits are discussed, including password selection and management, multi-factor authentication, anti-malware, and the need for regular software updates on consumer devices. A minor editorial slip: the synopses of chapters 14 and 15 in the introductory chapter are reversed.

Chapter 16 discusses potential careers in the field of cybersecurity and describes the structure, management, and governance of an example cybersecurity function within an organization. Chapter 17 provides an excellent, short recap of the entire book, including simple tables to highlight the key points of each chapter. There is a detailed table of contents and good index, and chapters conclude with succinct summaries. In essence, Daswani and Elbayadi have brought Fowler’s 2016 work [2] up to date. This is an excellent reference for anyone working in the area of ICT cybersecurity. Management in particular will find it useful, as the authors have tried to keep technical jargon to a minimum while explaining the steps that can be taken to protect and minimize the impact of cyberattacks on organizations.

More reviews about this item: Amazon

Reviewer:  David B. Henderson Review #: CR147569 (2305-0062)
1) Sloan, R. H.; Warner, R. Why don’t we defend better? Data breaches, risk management, and public policy. CRC Press, Boca Raton, FL, 2020.
2) Fowler, K. Data breach preparation and response: breaches are certain, impact is not. Syngress, Cambridge, MA, 2016.
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy