Pagina principaleGruppiConversazioniAltroStatistiche
Cerca nel Sito
Questo sito utilizza i cookies per fornire i nostri servizi, per migliorare le prestazioni, per analisi, e (per gli utenti che accedono senza fare login) per la pubblicità. Usando LibraryThing confermi di aver letto e capito le nostre condizioni di servizio e la politica sulla privacy. Il tuo uso del sito e dei servizi è soggetto a tali politiche e condizioni.

Risultati da Google Ricerca Libri

Fai clic su di un'immagine per andare a Google Ricerca Libri.

Sto caricando le informazioni...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (2014)

di Kim Zetter

Altri autori: Vedi la sezione altri autori.

UtentiRecensioniPopolaritàMedia votiCitazioni
5213147,130 (4.06)5
Computer Technology. History. Military. Nonfiction. HTML:Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran??s nuclear efforts and shows how its existence has ushered in a new age of warfare??one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery??apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm??s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world??s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet??s planning, execution, and discovery, covering its genesis in the corridors of Bush??s White House and its unleashing on systems in Iran??and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today??s flourishing zero-day ??grey markets,? in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike??and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter??s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a
… (altro)
Sto caricando le informazioni...

Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro.

Attualmente non vi sono conversazioni su questo libro.

» Vedi le 5 citazioni

"A new age of mass destruction will begin in an effort to close a chapter from the first age of mass destruction."
A dense (but engrossing) read, this is about Stuxnet, the game-changing virus/worm that signalled the age of cyberwarfare.
Since this is a true story (and not based on one), it becomes a drudgery to wade through the 'boring' parts, but it is all made up for in the last third of the work, which details how the world landscape was changed irrevocably (for the worse) through trying to sabotage Iran's nuclear program.
TL;DR - reads like an expanded magazine article series, read if you can withstand factual writing which looks to be techno-babble, but don't read it if you want some sort of 'excitement' in your 'plot'. ( )
  SidKhanooja | Sep 1, 2023 |
pick up on page 206
  pollycallahan | Jul 1, 2023 |
I would actually give this 4.5 stars if I could. It is a thorough and complex look at Stuxnet and the issues surrounding cyber warfare that reads almost like a thriller. It goes into technical detail without getting too bogged down. It can be occasionally difficult to follow but that may be unavoidable given the subject. I think the author does a good job of considering the consequences of opening up this Pandora's Box. ( )
  MarkMad | Jul 14, 2021 |
An excellent account of Stuxnet. As a subject matter expert employed in the field, I watched this intently as it unfolded, and was familiar with much of the material in the book, but still found it enjoyable and informative. For anyone who hasn't been following Stuxnet and related issues closely, this book would be an excellent introduction. Even without a technical background, it would be easy to follow the human and political implications.


(Second book I've read this year (audible audiobook, in this case, unabridged)) ( )
  octal | Jan 1, 2021 |
Nerd level 10! Great story. Some really good, deep investigative journalism. Quoted a lot froM Sanger book, so read that one as well. Very enjoyable. Described the hack with a level of detail that didnt overwhelm the non-computer science nerd. And a very impressive piece of malwaare that was built. Also liked that she talked a bit about the ethical implications of a virus like stuxnet. ( )
  bermandog | Sep 26, 2020 |
nessuna recensione | aggiungi una recensione

» Aggiungi altri autori

Nome dell'autoreRuoloTipo di autoreOpera?Stato
Kim Zetterautore primariotutte le edizionicalcolato
Munday, OliverProgetto della copertinaautore secondarioalcune edizioniconfermato
Devi effettuare l'accesso per contribuire alle Informazioni generali.
Per maggiori spiegazioni, vedi la pagina di aiuto delle informazioni generali.
Titolo canonico
Titolo originale
Titoli alternativi
Data della prima edizione
Personaggi
Luoghi significativi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Eventi significativi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Film correlati
Epigrafe
Dedica
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
For SC and for my parnets --- with love and grea gratitude, though gratitude is insufficient for all that you've done.
Incipit
Citazioni
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Once the rogue .DLL was in place, what it did was quite remarkable.     Whenever an engineer tried to send commands to a PLC, Stuxnet made sure its own malicious command code got sent and executed instead. But it didn’t just overwrite the original commands in a simple swap. Stuxnet increased the side of the code block and slipped its malicious code in at the front end. Then to make sure its malicious commands got activated instead of the legitimate ones, Stuxnet also hooked a core block of code on the PLC that was responsible for reading and executing commands. A lot of knowledge and skill were required to inject the code seamlessly in this way without “bricking” the PLCs (that is, causing them to seize up or become nonfunctional), but the attackers pulled it off beautifully.     The second part of the attack was even more ingenious. Before Stuxnet’s malicious commands went into action, the malware sat patiently on the PLC for about two weeks, sometimes longer, recording legitimate operations as the controller sent status reports back to monitoring stations. Then when Stuxnet’s malicious commands leapt into action, the malware replayed the recorded data back to operators to blind them to anything amiss on the machines – like a Hollywood heist film where the thieves insert a looped video clip into surveillance camera feeds. While Stuxnet sabotaged the PLC, it also disabled automated digital alarms to prevent safety systems from kicking in and halting whatever process the PLC was controlling it it sensed the equipment was entering a danger zone. Stuxnet did this by altering blocks of code known as OB35 that were part of the PLC’s safety system. These were used to monitor critical operations, such as the speed of a turbine the PLC was controlling. The blocks were generated every 100 milliseconds by the PLC so that safety systems could kick in quickly if a turbine began spinning out of control or something else went wrong, allowing the system or an operator to set off a kill switch and initiate a shutdown. But with Stuxnet modifying the data the safety system relied on, the system was blind to dangerous conditions and never had a chance to act.
Ultime parole
Nota di disambiguazione
Redattore editoriale
Elogi
Lingua originale
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
DDC/MDS Canonico
LCC canonico

Risorse esterne che parlano di questo libro

Wikipedia in inglese (3)

Computer Technology. History. Military. Nonfiction. HTML:Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran??s nuclear efforts and shows how its existence has ushered in a new age of warfare??one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery??apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm??s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world??s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet??s planning, execution, and discovery, covering its genesis in the corridors of Bush??s White House and its unleashing on systems in Iran??and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today??s flourishing zero-day ??grey markets,? in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike??and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter??s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a

Non sono state trovate descrizioni di biblioteche

Descrizione del libro
Riassunto haiku

Già recensito in anteprima su LibraryThing

Il libro di Kim Zetter Countdown to Zero Day è stato disponibile in LibraryThing Early Reviewers.

Discussioni correnti

Nessuno

Copertine popolari

Link rapidi

Voto

Media: (4.06)
0.5
1
1.5
2 3
2.5
3 22
3.5 6
4 43
4.5 7
5 35

Sei tu?

Diventa un autore di LibraryThing.

 

A proposito di | Contatto | LibraryThing.com | Privacy/Condizioni d'uso | Guida/FAQ | Blog | Negozio | APIs | TinyCat | Biblioteche di personaggi celebri | Recensori in anteprima | Informazioni generali | 206,340,480 libri! | Barra superiore: Sempre visibile