| Foreword |
|
xxiii | |
|
|
| Introduction |
|
xxiv | |
| Acknowledgments |
|
xxxiii | |
| About the Authors |
|
xxxiv | |
|
|
|
1 | (55) |
|
Chapter 1 What Is Cybersecurity? |
|
|
2 | (34) |
|
Everyone Knows What "Cybersecurity" Means |
|
|
2 | (3) |
|
We Can Measure How Secure Our Systems Are |
|
|
5 | (6) |
|
|
|
8 | (1) |
|
|
|
9 | (1) |
|
|
|
10 | (1) |
|
|
|
11 | (1) |
|
The Primary Goal of Cybersecurity Is Security |
|
|
11 | (1) |
|
Cybersecurity Is About Obvious Risks |
|
|
12 | (2) |
|
Sharing More Cyber Threat Intel Will Make Things Better |
|
|
14 | (2) |
|
What Matters to You Matters to Everyone Else |
|
|
16 | (1) |
|
Product X Will Make You Secure |
|
|
17 | (1) |
|
Macs Are Safer Than PCs, Linux Is Safer Than Windows |
|
|
18 | (1) |
|
Open Source Software Is More Secure Than Closed Source Software |
|
|
19 | (1) |
|
Technology X Will Make You Secure |
|
|
20 | (1) |
|
Process X Will Make You Secure |
|
|
21 | (1) |
|
Faerie Dust Can Make Old Ideas Magically Revolutionary |
|
|
22 | (1) |
|
Passwords Should Be Changed Often |
|
|
23 | (3) |
|
Believe and Fear Every Hacking Demo You See |
|
|
26 | (1) |
|
Cyber Offense Is Easier Than Defense |
|
|
27 | (2) |
|
Operational Technology (OT) Is Not Vulnerable |
|
|
29 | (1) |
|
Breaking Systems Is the Best Way to Establish Yourself |
|
|
30 | (1) |
|
Because You Can, You Should |
|
|
30 | (2) |
|
Better Security Means Worse Privacy |
|
|
32 | (1) |
|
|
|
33 | (3) |
|
Chapter 2 What Is the Internet? |
|
|
36 | (20) |
|
Everyone Knows What the "Internet" Means |
|
|
36 | (1) |
|
An IP Address Identifies a Unique Machine |
|
|
37 | (2) |
|
The Internet Is Managed and Controlled by a Central Body |
|
|
39 | (1) |
|
The Internet Is Largely Static |
|
|
40 | (1) |
|
|
|
41 | (2) |
|
You Know Your Crown Jewels and Where They Are |
|
|
43 | (1) |
|
|
|
43 | (1) |
|
Cryptocurrency Is Untraceable |
|
|
44 | (2) |
|
Everything Can Be Fixed with Blockchain |
|
|
46 | (1) |
|
The Internet Is Like an Iceberg |
|
|
46 | (2) |
|
The Dark Web Is Only for Criminal Activity |
|
|
47 | (1) |
|
Activity on the Dark Web Is Untraceable |
|
|
47 | (1) |
|
A VPN Makes You Anonymous |
|
|
48 | (1) |
|
|
|
49 | (2) |
|
|
|
51 | (5) |
|
|
|
56 | (105) |
|
Chapter 3 Faulty Assumptions and Magical Thinking |
|
|
56 | (32) |
|
Humans Will Behave Rationally, So Blame the User! |
|
|
57 | (5) |
|
We Know Everything We Need to Know About Cybersecurity Problems |
|
|
62 | (1) |
|
Compliance Equals (Complete) Security |
|
|
63 | (2) |
|
Authentication Provides Confidentiality |
|
|
65 | (1) |
|
I Can Never Be Secure, So Why Bother? |
|
|
65 | (1) |
|
I Am Too Small/Insignificant to Be a Target |
|
|
66 | (3) |
|
Everybody Is Out to Get Me |
|
|
69 | (2) |
|
I Engage Only with Trusted Websites, So My Data Is Safe from a Breach |
|
|
71 | (1) |
|
Security by Obscurity Is Reasonably Secure |
|
|
72 | (2) |
|
The Illusions of Visibility and Control |
|
|
74 | (2) |
|
Five 9's Is the Key to Cybersecurity |
|
|
76 | (2) |
|
Everybody Has Top-of-the4_ine Technology |
|
|
78 | (2) |
|
We Can Predict Future Threats |
|
|
80 | (1) |
|
Security People Control Security Outcomes |
|
|
81 | (1) |
|
All Bad Outcomes Are the Result of a Bad Decision |
|
|
82 | (2) |
|
More Security Is Always Better |
|
|
84 | (1) |
|
Best Practices Are Always Best |
|
|
85 | (1) |
|
Because It Is Online It Must Be True/Correct |
|
|
86 | (1) |
|
|
|
87 | (1) |
|
Chapter 4 Fallacies and Misunderstandings |
|
|
88 | (22) |
|
The False Cause Fallacy: Correlation Is Causation |
|
|
89 | (3) |
|
Absence of Evidence Is Evidence of Absence |
|
|
92 | (2) |
|
|
|
94 | (1) |
|
|
|
95 | (1) |
|
Hasty Generalization Fallacy |
|
|
96 | (1) |
|
|
|
97 | (1) |
|
|
|
98 | (2) |
|
|
|
100 | (1) |
|
|
|
100 | (1) |
|
|
|
101 | (2) |
|
Conjunction and Disjunction Fallacies |
|
|
103 | (1) |
|
|
|
104 | (1) |
|
|
|
104 | (1) |
|
|
|
105 | (2) |
|
|
|
107 | (2) |
|
|
|
107 | (1) |
|
|
|
107 | (1) |
|
|
|
108 | (1) |
|
|
|
108 | (1) |
|
|
|
108 | (1) |
|
|
|
109 | (1) |
|
|
|
109 | (1) |
|
Chapter 5 Cognitive Biases |
|
|
110 | (20) |
|
|
|
112 | (1) |
|
|
|
113 | (2) |
|
|
|
115 | (1) |
|
|
|
116 | (1) |
|
|
|
117 | (1) |
|
|
|
117 | (2) |
|
|
|
119 | (2) |
|
|
|
121 | (1) |
|
|
|
122 | (1) |
|
|
|
123 | (1) |
|
|
|
124 | (1) |
|
|
|
125 | (3) |
|
|
|
125 | (1) |
|
|
|
125 | (1) |
|
|
|
125 | (3) |
|
|
|
128 | |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
126 | (1) |
|
|
|
127 | (1) |
|
|
|
127 | (1) |
|
|
|
127 | (1) |
|
|
|
127 | (1) |
|
|
|
128 | (1) |
|
|
|
128 | (2) |
|
Chapter 6 Perverse Incentives and the Cobra Effect |
|
|
130 | (10) |
|
The Goal of a Security Vendor Is to Keep You Secure |
|
|
131 | (1) |
|
Your Cybersecurity Decisions Affect Only You |
|
|
132 | (2) |
|
Bug Bounties Eliminate Bugs from the Offensive Market |
|
|
134 | (1) |
|
Cyber Insurance Causes People to Take Less Risk |
|
|
135 | (1) |
|
Fines and Penalties Cause People to Take Less Risk |
|
|
136 | (1) |
|
Attacking Back Would Help Stop Cyber Crime |
|
|
137 | (1) |
|
Innovation Increases Security and Privacy Incidents |
|
|
138 | (1) |
|
|
|
139 | (1) |
|
Chapter 7 Problems and Solutions |
|
|
140 | (21) |
|
Failure Is Not an Option in Cybersecurity |
|
|
141 | (1) |
|
Every Problem Has a Solution |
|
|
142 | (5) |
|
We Can Solve All Our Problems with Big Data |
|
|
144 | (2) |
|
There Is One, and Only One, Correct Solution |
|
|
146 | (1) |
|
Everyone Should Solve a Given Cybersecurity Problem in the Same Way |
|
|
147 | (1) |
|
Anecdotes Are Good Leads for Cybersecurity Solutions |
|
|
147 | (1) |
|
Detecting More "Bad Stuff" Means the New Thing Is an Improvement |
|
|
148 | (1) |
|
Every Security Process Should Be Automated |
|
|
149 | (2) |
|
Professional Certifications Are Useless |
|
|
151 | (7) |
|
To Work in Cybersecurity Does (Not) Require a College Degree in Computing |
|
|
151 | (3) |
|
Cybersecurity Certifications Are (Not) Valuable |
|
|
154 | (1) |
|
There Is a Shortage of Cybersecurity Talent |
|
|
155 | (1) |
|
There Is a Disconnect Between Study and Practice |
|
|
156 | (2) |
|
|
|
158 | (3) |
|
Part III Contextual Issues |
|
|
161 | (126) |
|
Chapter 8 Pitfalls of Analogies and Abstractions |
|
|
162 | (18) |
|
Cybersecurity Is Like the Physical World |
|
|
165 | (5) |
|
Cybersecurity Is Like Defending a Castle |
|
|
166 | (1) |
|
Digital Theft Is Like Physical Theft |
|
|
167 | (1) |
|
Users Are the "Weakest Link" |
|
|
167 | (3) |
|
Cybersecurity Is Like Medicine and Biology |
|
|
170 | (2) |
|
Cybersecurity Is Like Fighting a War |
|
|
172 | (3) |
|
|
|
173 | (1) |
|
|
|
173 | (1) |
|
|
|
174 | (1) |
|
Cybersecurity Law Is Analogous to Physical-World Law |
|
|
175 | (1) |
|
Tips for Analogies and Abstractions |
|
|
175 | (3) |
|
|
|
178 | (2) |
|
|
|
180 | (18) |
|
Cybersecurity Law Is Analogous to Physical-World Law |
|
|
181 | (1) |
|
Your Laws Do Not Apply to Me Where I Am |
|
|
182 | (2) |
|
That Violates My First Amendment Rights! |
|
|
184 | (2) |
|
|
|
184 | (1) |
|
Jurisdictional Differences |
|
|
185 | (1) |
|
Legal Code Supersedes Computer Code |
|
|
186 | (5) |
|
Laws Can Simply Be Converted to Computer Code |
|
|
187 | (1) |
|
Legislators/Regulators/Courts Know Enough About Technology to Regulate It |
|
|
188 | (1) |
|
Laws and Courts Unduly Constrain Developers |
|
|
189 | (2) |
|
Law Enforcement Will Never Respond to Cyber Crimes |
|
|
191 | (2) |
|
You Can Always Hide Information by Suing |
|
|
193 | (1) |
|
Suing to Suppress a Breach Is a Good Idea |
|
|
194 | (1) |
|
Terms and Conditions Are Meaningless |
|
|
194 | (1) |
|
The Law Is on My Side, So I Do Not Need to Worry |
|
|
195 | (1) |
|
|
|
196 | (2) |
|
Chapter 10 Tool Myths and Misconceptions |
|
|
198 | (16) |
|
The More Tools, The Better |
|
|
199 | (2) |
|
Every New Threat Needs a New Tool |
|
|
200 | (1) |
|
Default Configurations Are Always Secure |
|
|
201 | (2) |
|
A Tool Can Stop All Bad Things |
|
|
203 | (2) |
|
Intent Can Be Determined from Tools |
|
|
205 | (2) |
|
Security Tools Are Inherently Secure and Trustworthy |
|
|
207 | (2) |
|
Nothing Found Means All Is Well |
|
|
209 | (3) |
|
Nothing Found by the Scanners Means We Are Secure |
|
|
209 | (1) |
|
No Alarms Means We Are Secure |
|
|
210 | (2) |
|
No Vulnerability Reports Means No Vulnerabilities |
|
|
212 | (1) |
|
|
|
212 | (2) |
|
Chapter 11 Vulnerabilities |
|
|
214 | (30) |
|
We Know Everything There Is to Know About Vulnerabilities |
|
|
215 | (3) |
|
Vulnerabilities Are Sparse |
|
|
218 | (1) |
|
Attackers Are Getting More Proficient |
|
|
218 | (1) |
|
Zero-Day Vulnerabilities Are Most Important |
|
|
219 | (4) |
|
Zero-Days Are the Scariest |
|
|
219 | (3) |
|
Zero-Days Mean Persistence |
|
|
222 | (1) |
|
All Attacks Hinge on a Vulnerability |
|
|
223 | (3) |
|
Exploits and Proofs of Concept Are Bad |
|
|
226 | (2) |
|
Vulnerabilities Happen Only in Complex Code |
|
|
228 | (2) |
|
First Movers Should Sacrifice Security |
|
|
230 | (1) |
|
Patches Are Always Perfect and Available |
|
|
231 | (5) |
|
Defenses Might Become Security Vulnerabilities with Time |
|
|
236 | (1) |
|
All Vulnerabilities Can Be Fixed |
|
|
237 | (2) |
|
Scoring Vulnerabilities Is Easy and Well Understood |
|
|
239 | (1) |
|
Because You Can, You Should--Vulnerabilities Edition |
|
|
240 | (1) |
|
Vulnerability Names Reflect Their Importance |
|
|
241 | (1) |
|
|
|
242 | (2) |
|
|
|
244 | (22) |
|
Using a Sandbox Will Tell Me Everything I Need to Know |
|
|
246 | (3) |
|
Reverse Engineering Will Tell Me Everything I Need to Know |
|
|
249 | (2) |
|
Malware and Geography Are/Are Not Related |
|
|
251 | (2) |
|
I Can Always Determine Who Made the Malware and Attacked Me |
|
|
253 | (1) |
|
Malware Is Always a Complex Program That Is Difficult to Understand |
|
|
254 | (2) |
|
Free Malware Protection Is Good Enough |
|
|
256 | (1) |
|
Only Shady Websites Will Infect Me |
|
|
257 | (1) |
|
Because You Can, You Should--Malware Edition |
|
|
258 | (1) |
|
Ransomware Is an Entirely New Kind of Malware |
|
|
259 | (2) |
|
Signed Software Is Always Trustworthy |
|
|
261 | (2) |
|
Malware Names Reflect Their Importance |
|
|
263 | (1) |
|
|
|
264 | (2) |
|
Chapter 13 Digital Forensics and Incident Response |
|
|
266 | (21) |
|
Movies and Television Reflect the Reality of Cyber |
|
|
267 | (2) |
|
Incidents Are Discovered as Soon as They Occur |
|
|
269 | (1) |
|
Incidents Are Discrete and Independent |
|
|
270 | (1) |
|
Every Incident Is the Same Severity |
|
|
271 | (1) |
|
Standard Incident Response Techniques Can Deal with Ransomware |
|
|
272 | (1) |
|
Incident Responders Can Flip a Few Switches and Magically Everything Is Fixed |
|
|
273 | (3) |
|
Attacks Are Always Attributable |
|
|
276 | (2) |
|
|
|
278 | (2) |
|
Most Attacks/Exfiltration of Data Originate from Outside the Organization |
|
|
280 | (1) |
|
The Trojan Horse Defense Is Dead |
|
|
281 | (1) |
|
Endpoint Data Is Sufficient for Incident Detection |
|
|
282 | (2) |
|
Recovering from an Event Is a Simple and Linear Process |
|
|
284 | (1) |
|
|
|
285 | (2) |
|
|
|
287 | (49) |
|
Chapter 14 Lies, Damn Lies, and Statistics |
|
|
288 | (24) |
|
Luck Prevents Cyber Attacks |
|
|
289 | (1) |
|
The Numbers Speak for Themselves |
|
|
290 | (1) |
|
|
|
290 | (3) |
|
|
|
293 | (10) |
|
|
|
294 | (1) |
|
Forecasting an Inference with Statistics |
|
|
295 | (2) |
|
Correlation Implies Causation |
|
|
297 | (4) |
|
Errors in Classification Are Insignificant |
|
|
301 | (2) |
|
Data Is Not Important to Statistics |
|
|
303 | (3) |
|
Artificial Intelligence and Machine Learning Can Solve All Cybersecurity Problems |
|
|
306 | (4) |
|
|
|
310 | (2) |
|
Chapter 15 Illustrations, Visualizations, and Delusions |
|
|
312 | (14) |
|
Visualizations and Dashboards Are Inherently and Universally Helpful |
|
|
313 | (6) |
|
Cybersecurity Data Is Easy to Visualize |
|
|
319 | (5) |
|
Visualizing Internet Geolocation Is Useful |
|
|
320 | (3) |
|
Visualizing IPs and Ports Is Clear and Understandable |
|
|
323 | (1) |
|
|
|
324 | (2) |
|
|
|
326 | (10) |
|
Creating a Less Myth-Prone World |
|
|
328 | (1) |
|
The Critical Value of Documentation |
|
|
329 | (2) |
|
Meta-Myths and Recommendations |
|
|
331 | (3) |
|
|
|
332 | (1) |
|
|
|
333 | (1) |
|
Avoiding Other and Future Traps |
|
|
334 | (1) |
|
|
|
334 | (2) |
| Appendix: Short Background Explanations |
|
336 | (8) |
| Acronyms |
|
344 | (6) |
| Index |
|
350 | |