Catalog

Record Details

Catalog Search





Listening in : cybersecurity in an insecure age / Susan Landau.

Landau, Susan Eva, (author.).

Available copies

  • 1 of 1 copy available at Legislative Library.

Current holds

0 current holds with 1 total copy.

Location Call Number / Copy Notes Barcode Shelving Location Holdable? Status Due Date
Legislative Library, Vaughan Street K 3264 .C65 Lan (Text) 36970100162900 General Collection Volume hold Available -

Record details

  • ISBN: 9780300227444
  • ISBN: 0300227442
  • Physical Description: xiv, 221 pages ; 22 cm
  • Publisher: New Haven ; Yale University Press, [2017]

Content descriptions

Bibliography, etc. Note:
Includes bibliographical references (pages 173-207) and index.
Formatted Contents Note:
Racing into the digital revolution -- We're all connected now -- How do we protect ourselves? -- Investigation in the age of encryption -- There's no turning back.
Summary, etc.:
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country{u2019}s electricity{u2014}and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age."--Inside dust jacket.
Subject: Data encryption (Computer science) > Law and legislation.
Computer networks > Security measures > Government policy.
Computer security.

Additional Resources