You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches by Wolff, Josephine

You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches

What we can learn from the aftermath of cybersecurity breaches and how we can do a better...
BD$30.09 BMD
BD$30.09 BMD
SKU: 9780262553308
Product Type: Books
Please hurry! Only 0 left in stock
Author: Josephine Wolff
Format: Paperback
Language: English
Subtotal: BD$30.09
10 customers are viewing this product
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches by Wolff, Josephine

You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches

BD$30.09

You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches

BD$30.09
Author: Josephine Wolff
Format: Paperback
Language: English
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data.

Cybersecurity incidents make the news with startling regularity. Each breach--the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump--makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.

Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks--financial gain, espionage, and public humiliation of the victims--that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.

Author: Josephine Wolff
Publisher: MIT Press
Published: 11/12/2024
Pages: 334
Binding Type: Paperback
ISBN: 9780262553308

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products