The Death of the Internet (eBook, PDF)
Redaktion: Jakobsson, Markus
Alle Infos zum eBook verschenken
The Death of the Internet (eBook, PDF)
Redaktion: Jakobsson, Markus
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue,…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 5.75MB
- Garth O. BruenWHOIS Running the Internet (eBook, PDF)88,99 €
- The Death of the Internet (eBook, ePUB)69,99 €
- Norman F. SchneidewindComputer, Network, Software, and Hardware Engineering with Applications (eBook, PDF)137,99 €
- Shengjie XuCybersecurity in Intelligent Networking Systems (eBook, PDF)104,99 €
- Zahir TariData Exfiltration Threats and Prevention Techniques (eBook, PDF)103,99 €
- Cynthia BrumfieldCybersecurity Risk Management (eBook, PDF)89,99 €
- Eric BauerReliability and Availability of Cloud Computing (eBook, PDF)78,99 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 386
- Erscheinungstermin: 9. Juli 2012
- Englisch
- ISBN-13: 9781118312537
- Artikelnr.: 37354565
- Verlag: John Wiley & Sons
- Seitenzahl: 386
- Erscheinungstermin: 9. Juli 2012
- Englisch
- ISBN-13: 9781118312537
- Artikelnr.: 37354565
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mobile Target 182 5.1.5 Web Sender
Web Target 184 5.1.6 Attack Prevention 185 5.2 Why Mobile Malware will Explode 185 Markus Jakobsson and Mark Grandcolas 5.2.1 Nineteen Eighty-Six: When it all Started 186 5.2.2 A Glimpse of Users 186 5.2.3 Why Market Size Matters 186 5.2.4 Financial Trends 187 5.2.5 Mobile Malware Outlook 187 5.3 Tapjacking: Stealing Clicks on Mobile Devices 189 Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh 5.3.1 Framing Attacks 189 5.3.2 Phone Tapjacking 191 5.3.3 Framing Facebook 194 5.3.4 Summary and Recommendations 195 6 The Internet and the PhysicalWorld 197 6.1 Malware-Enabled Wireless Tracking Networks 197 Nathaniel Husted and Steven Myers 6.1.1 Introduction 198 6.1.2 The Anatomy of a Modern Smartphone 199 6.1.3 Mobile Tracking Networks: A Threat to Smartphones 200 6.1.4 Conclusion 219 6.2 Social Networking Leaks 219 Mayank Dhiman and Markus Jakobsson 6.2.1 Introduction 220 6.2.2 Motivations for Using Social Networking Sites 220 6.2.3 Trust and Privacy 221 6.2.4 Known Issues 222 6.2.5 Case Study: Social Networking Leaks in the Physical World 225 6.3 Abuse of Social Media and Political Manipulation 231 Bruno Gon
calves, Michael Conover, and Filippo Menczer 6.3.1 The Rise of Online Grassroots Political Movements 231 6.3.2 Spam and Astroturfing 232 6.3.3 Deceptive Tactics 233 6.3.4 The Truthy System for Astroturf Detection 236 6.3.5 Discussion 240 Part II Thinking About Solutions 7 Solutions to the Problem 245 7.1 When and How to Authenticate 245 Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song 7.1.1 Problem Description 246 7.1.2 Use Cases 247 7.1.3 System Architecture 248 7.1.4 User Privacy 250 7.1.5 Machine Learning/Algorithms 250 7.1.6 User Study 252 7.2 Fastwords: Adapting Passwords to Constrained Keyboards 255 Markus Jakobsson and Ruj Akavipat 7.2.1 The Principles Behind Fastwords 256 7.2.2 Basic Feature Set 258 7.2.3 Extended Feature Set 260 7.2.4 Sample Stories and Frequencies 261 7.2.5 Recall Rates 262 7.2.6 Security Analysis 264 7.2.7 The Security of Passwords 264 7.2.8 Entry Speed 268 7.2.9 Implementation of Fastword Entry 270 7.2.10 Conclusion 271 7.3 Deriving PINs from Passwords 271 Markus Jakobsson and Debin Liu 7.3.1 Introduction 272 7.3.2 A Brief Discussion of Passwords 273 7.3.3 How to Derive PINs from Passwords 274 7.3.4 Analysis of Passwords and Derived PINs 275 7.3.5 Security Analysis 278 7.3.6 Usability Experiments 280 7.4 Visual Preference Authentication 282 Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir 7.4.1 Password Resets 282 7.4.2 Security Questions Aren't so Secure 283 7.4.3 What is Visual Preference-Based Authentication 283 7.4.4 Evaluating Visual Preference-Based Authentication 285 7.4.5 Case Study: Visual Blue Moon Authentication 286 7.4.6 Conclusion 290 7.5 The Deadly Sins of Security User Interfaces 290 Nathan Good 7.5.1 Security Applications with Frustrating User Interfaces 291 7.5.2 The Four Sins of Security Application User Interfaces 293 7.5.3 Consumer Choice: A Security Bugbear 293 7.5.4 Security by Verbosity 299 7.5.5 Walls of Checkboxes 300 7.5.6 All or Nothing Switch 302 7.5.7 Conclusion 304 7.6 SpoofKiller-Let's Kiss Spoofing Goodbye! 304 Markus Jakobsson and William Leddy 7.6.1 A Key to the Solution: Interrupts 305 7.6.2 Why can the User Log in to Good Sites, but not Bad Ones? 305 7.6.3 What About Sites that are Good . . . but not Certified Good? 308 7.6.4 SpoofKiller: Under the Hood 309 7.6.5 Say we Implement SpoofKiller-then What? 311 7.7 Device Identification and Intelligence 312 Ori Eisen 7.7.1 1995-2001: The Early Years of Device Identification 313 7.7.2 2001-2008 Tagless Device Identification Begins 314 7.7.3 2008-Present: Private Browsing and Beyond 319 7.8 How can we Determine if a Device is Infected or not? 323 Aur
elien Francillon, Markus Jakobsson, and Adrian Perrig 7.8.1 Why Detection is Difficult 323 7.8.2 Setting up an Isolated Environment 324 7.8.3 What Could go Wrong? 326 7.8.4 Brief Comparison with TrustZone 328 7.8.5 Summary 328 8 The Future 331 8.1 Security Needs the Best User Experience 332 Hampus Jakobsson 8.1.1 How the User Won Over Features 332 8.1.2 So How Come the iPhone Became so Successful? 332 8.1.3 A World of Information Anywhere 333 8.1.4 Midas' Touch Screens 334 8.1.5 New Input, New Opportunities 335 8.1.6 Zero-Click and Real-Life User Interfaces 335 8.1.7 Privacy and User Interfaces 336 8.1.8 It all Comes Together 336 8.2 Fraud and the Future 336 Markus Jakobsson References 339 Index 359
Mobile Target 182 5.1.5 Web Sender
Web Target 184 5.1.6 Attack Prevention 185 5.2 Why Mobile Malware will Explode 185 Markus Jakobsson and Mark Grandcolas 5.2.1 Nineteen Eighty-Six: When it all Started 186 5.2.2 A Glimpse of Users 186 5.2.3 Why Market Size Matters 186 5.2.4 Financial Trends 187 5.2.5 Mobile Malware Outlook 187 5.3 Tapjacking: Stealing Clicks on Mobile Devices 189 Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh 5.3.1 Framing Attacks 189 5.3.2 Phone Tapjacking 191 5.3.3 Framing Facebook 194 5.3.4 Summary and Recommendations 195 6 The Internet and the PhysicalWorld 197 6.1 Malware-Enabled Wireless Tracking Networks 197 Nathaniel Husted and Steven Myers 6.1.1 Introduction 198 6.1.2 The Anatomy of a Modern Smartphone 199 6.1.3 Mobile Tracking Networks: A Threat to Smartphones 200 6.1.4 Conclusion 219 6.2 Social Networking Leaks 219 Mayank Dhiman and Markus Jakobsson 6.2.1 Introduction 220 6.2.2 Motivations for Using Social Networking Sites 220 6.2.3 Trust and Privacy 221 6.2.4 Known Issues 222 6.2.5 Case Study: Social Networking Leaks in the Physical World 225 6.3 Abuse of Social Media and Political Manipulation 231 Bruno Gon
calves, Michael Conover, and Filippo Menczer 6.3.1 The Rise of Online Grassroots Political Movements 231 6.3.2 Spam and Astroturfing 232 6.3.3 Deceptive Tactics 233 6.3.4 The Truthy System for Astroturf Detection 236 6.3.5 Discussion 240 Part II Thinking About Solutions 7 Solutions to the Problem 245 7.1 When and How to Authenticate 245 Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song 7.1.1 Problem Description 246 7.1.2 Use Cases 247 7.1.3 System Architecture 248 7.1.4 User Privacy 250 7.1.5 Machine Learning/Algorithms 250 7.1.6 User Study 252 7.2 Fastwords: Adapting Passwords to Constrained Keyboards 255 Markus Jakobsson and Ruj Akavipat 7.2.1 The Principles Behind Fastwords 256 7.2.2 Basic Feature Set 258 7.2.3 Extended Feature Set 260 7.2.4 Sample Stories and Frequencies 261 7.2.5 Recall Rates 262 7.2.6 Security Analysis 264 7.2.7 The Security of Passwords 264 7.2.8 Entry Speed 268 7.2.9 Implementation of Fastword Entry 270 7.2.10 Conclusion 271 7.3 Deriving PINs from Passwords 271 Markus Jakobsson and Debin Liu 7.3.1 Introduction 272 7.3.2 A Brief Discussion of Passwords 273 7.3.3 How to Derive PINs from Passwords 274 7.3.4 Analysis of Passwords and Derived PINs 275 7.3.5 Security Analysis 278 7.3.6 Usability Experiments 280 7.4 Visual Preference Authentication 282 Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir 7.4.1 Password Resets 282 7.4.2 Security Questions Aren't so Secure 283 7.4.3 What is Visual Preference-Based Authentication 283 7.4.4 Evaluating Visual Preference-Based Authentication 285 7.4.5 Case Study: Visual Blue Moon Authentication 286 7.4.6 Conclusion 290 7.5 The Deadly Sins of Security User Interfaces 290 Nathan Good 7.5.1 Security Applications with Frustrating User Interfaces 291 7.5.2 The Four Sins of Security Application User Interfaces 293 7.5.3 Consumer Choice: A Security Bugbear 293 7.5.4 Security by Verbosity 299 7.5.5 Walls of Checkboxes 300 7.5.6 All or Nothing Switch 302 7.5.7 Conclusion 304 7.6 SpoofKiller-Let's Kiss Spoofing Goodbye! 304 Markus Jakobsson and William Leddy 7.6.1 A Key to the Solution: Interrupts 305 7.6.2 Why can the User Log in to Good Sites, but not Bad Ones? 305 7.6.3 What About Sites that are Good . . . but not Certified Good? 308 7.6.4 SpoofKiller: Under the Hood 309 7.6.5 Say we Implement SpoofKiller-then What? 311 7.7 Device Identification and Intelligence 312 Ori Eisen 7.7.1 1995-2001: The Early Years of Device Identification 313 7.7.2 2001-2008 Tagless Device Identification Begins 314 7.7.3 2008-Present: Private Browsing and Beyond 319 7.8 How can we Determine if a Device is Infected or not? 323 Aur
elien Francillon, Markus Jakobsson, and Adrian Perrig 7.8.1 Why Detection is Difficult 323 7.8.2 Setting up an Isolated Environment 324 7.8.3 What Could go Wrong? 326 7.8.4 Brief Comparison with TrustZone 328 7.8.5 Summary 328 8 The Future 331 8.1 Security Needs the Best User Experience 332 Hampus Jakobsson 8.1.1 How the User Won Over Features 332 8.1.2 So How Come the iPhone Became so Successful? 332 8.1.3 A World of Information Anywhere 333 8.1.4 Midas' Touch Screens 334 8.1.5 New Input, New Opportunities 335 8.1.6 Zero-Click and Real-Life User Interfaces 335 8.1.7 Privacy and User Interfaces 336 8.1.8 It all Comes Together 336 8.2 Fraud and the Future 336 Markus Jakobsson References 339 Index 359