PortadaGruposCharlasMásPanorama actual
Buscar en el sitio
Este sitio utiliza cookies para ofrecer nuestros servicios, mejorar el rendimiento, análisis y (si no estás registrado) publicidad. Al usar LibraryThing reconoces que has leído y comprendido nuestros términos de servicio y política de privacidad. El uso del sitio y de los servicios está sujeto a estas políticas y términos.

Resultados de Google Books

Pulse en una miniatura para ir a Google Books.

Cargando...

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon (2014)

por Kim Zetter

Otros autores: Ver la sección otros autores.

MiembrosReseñasPopularidadValoración promediaMenciones
5173147,191 (4.06)5
Computer Technology. History. Military. Nonfiction. HTML:Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran??s nuclear efforts and shows how its existence has ushered in a new age of warfare??one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery??apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm??s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world??s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet??s planning, execution, and discovery, covering its genesis in the corridors of Bush??s White House and its unleashing on systems in Iran??and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today??s flourishing zero-day ??grey markets,? in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike??and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter??s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a
… (más)
Cargando...

Inscríbete en LibraryThing para averiguar si este libro te gustará.

Actualmente no hay Conversaciones sobre este libro.

» Ver también 5 menciones

Mostrando 1-5 de 32 (siguiente | mostrar todos)
"A new age of mass destruction will begin in an effort to close a chapter from the first age of mass destruction."
A dense (but engrossing) read, this is about Stuxnet, the game-changing virus/worm that signalled the age of cyberwarfare.
Since this is a true story (and not based on one), it becomes a drudgery to wade through the 'boring' parts, but it is all made up for in the last third of the work, which details how the world landscape was changed irrevocably (for the worse) through trying to sabotage Iran's nuclear program.
TL;DR - reads like an expanded magazine article series, read if you can withstand factual writing which looks to be techno-babble, but don't read it if you want some sort of 'excitement' in your 'plot'. ( )
  SidKhanooja | Sep 1, 2023 |
pick up on page 206
  pollycallahan | Jul 1, 2023 |
I would actually give this 4.5 stars if I could. It is a thorough and complex look at Stuxnet and the issues surrounding cyber warfare that reads almost like a thriller. It goes into technical detail without getting too bogged down. It can be occasionally difficult to follow but that may be unavoidable given the subject. I think the author does a good job of considering the consequences of opening up this Pandora's Box. ( )
  MarkMad | Jul 14, 2021 |
An excellent account of Stuxnet. As a subject matter expert employed in the field, I watched this intently as it unfolded, and was familiar with much of the material in the book, but still found it enjoyable and informative. For anyone who hasn't been following Stuxnet and related issues closely, this book would be an excellent introduction. Even without a technical background, it would be easy to follow the human and political implications.


(Second book I've read this year (audible audiobook, in this case, unabridged)) ( )
  octal | Jan 1, 2021 |
Nerd level 10! Great story. Some really good, deep investigative journalism. Quoted a lot froM Sanger book, so read that one as well. Very enjoyable. Described the hack with a level of detail that didnt overwhelm the non-computer science nerd. And a very impressive piece of malwaare that was built. Also liked that she talked a bit about the ethical implications of a virus like stuxnet. ( )
  bermandog | Sep 26, 2020 |
Mostrando 1-5 de 32 (siguiente | mostrar todos)
sin reseñas | añadir una reseña

» Añade otros autores

Nombre del autorRolTipo de autor¿Obra?Estado
Kim Zetterautor principaltodas las edicionescalculado
Munday, OliverDiseñador de cubiertaautor secundarioalgunas edicionesconfirmado
Debes iniciar sesión para editar los datos de Conocimiento Común.
Para más ayuda, consulta la página de ayuda de Conocimiento Común.
Título canónico
Título original
Títulos alternativos
Fecha de publicación original
Personas/Personajes
Lugares importantes
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
Acontecimientos importantes
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
Películas relacionadas
Epígrafe
Dedicatoria
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
For SC and for my parnets --- with love and grea gratitude, though gratitude is insufficient for all that you've done.
Primeras palabras
Citas
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
Once the rogue .DLL was in place, what it did was quite remarkable.     Whenever an engineer tried to send commands to a PLC, Stuxnet made sure its own malicious command code got sent and executed instead. But it didn’t just overwrite the original commands in a simple swap. Stuxnet increased the side of the code block and slipped its malicious code in at the front end. Then to make sure its malicious commands got activated instead of the legitimate ones, Stuxnet also hooked a core block of code on the PLC that was responsible for reading and executing commands. A lot of knowledge and skill were required to inject the code seamlessly in this way without “bricking” the PLCs (that is, causing them to seize up or become nonfunctional), but the attackers pulled it off beautifully.     The second part of the attack was even more ingenious. Before Stuxnet’s malicious commands went into action, the malware sat patiently on the PLC for about two weeks, sometimes longer, recording legitimate operations as the controller sent status reports back to monitoring stations. Then when Stuxnet’s malicious commands leapt into action, the malware replayed the recorded data back to operators to blind them to anything amiss on the machines – like a Hollywood heist film where the thieves insert a looped video clip into surveillance camera feeds. While Stuxnet sabotaged the PLC, it also disabled automated digital alarms to prevent safety systems from kicking in and halting whatever process the PLC was controlling it it sensed the equipment was entering a danger zone. Stuxnet did this by altering blocks of code known as OB35 that were part of the PLC’s safety system. These were used to monitor critical operations, such as the speed of a turbine the PLC was controlling. The blocks were generated every 100 milliseconds by the PLC so that safety systems could kick in quickly if a turbine began spinning out of control or something else went wrong, allowing the system or an operator to set off a kill switch and initiate a shutdown. But with Stuxnet modifying the data the safety system relied on, the system was blind to dangerous conditions and never had a chance to act.
Últimas palabras
Aviso de desambiguación
Editores de la editorial
Blurbistas
Idioma original
Información procedente del conocimiento común inglés. Edita para encontrar en tu idioma.
DDC/MDS Canónico
LCC canónico

Referencias a esta obra en fuentes externas.

Wikipedia en inglés (3)

Computer Technology. History. Military. Nonfiction. HTML:Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran??s nuclear efforts and shows how its existence has ushered in a new age of warfare??one in which a digital attack can have the same destructive capability as a megaton bomb.
 
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery??apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
 
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
 
 At first, the firm??s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
 
They had, they soon learned, stumbled upon the world??s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. 
 
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet??s planning, execution, and discovery, covering its genesis in the corridors of Bush??s White House and its unleashing on systems in Iran??and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
 
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today??s flourishing zero-day ??grey markets,? in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike??and shows us just what might happen should our infrastructure be targeted by such an attack.
 
Propelled by Zetter??s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a

No se han encontrado descripciones de biblioteca.

Descripción del libro
Resumen Haiku

Antiguo miembro de Primeros reseñadores de LibraryThing

El libro Countdown to Zero Day de Kim Zetter estaba disponible desde LibraryThing Early Reviewers.

Debates activos

Ninguno

Cubiertas populares

Enlaces rápidos

Valoración

Promedio: (4.06)
0.5
1
1.5
2 3
2.5
3 22
3.5 6
4 43
4.5 7
5 34

¿Eres tú?

Conviértete en un Autor de LibraryThing.

 

Acerca de | Contactar | LibraryThing.com | Privacidad/Condiciones | Ayuda/Preguntas frecuentes | Blog | Tienda | APIs | TinyCat | Bibliotecas heredadas | Primeros reseñadores | Conocimiento común | 204,869,521 libros! | Barra superior: Siempre visible