The battle for your computer Israel and the growth of the global cyber-security industry
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Inc
[2023]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009769036206719 |
Tabla de Contenidos:
- Cover Page
- Title Page
- Copyright Page
- Contents
- Preface
- Acknowledgments
- Section 1 What Is Cybersecurity?
- Chapter 1 The New Gold-Cybersecurity 101
- The battle over data
- Gold on the cloud
- The Internet of Things
- Chapter 2 The Keyboard War-How Global Militaries Exploited the New Domain
- The new Trojan horse
- Hacking public opinion
- Chapter 3 "Hello, It's Me, a Nigerian Prince"-New Crime
- Fraud
- Extortion
- Hacktivism
- Chapter 4 The New Money-Catalysts of Cybercrime
- The dark web
- Bitcoin
- Section 2 Cybernation
- Chapter 5 The Pioneer-The Story of Check Point
- Before cyber was fully cyber
- Chapter 6 The Love Letter That Leaked-From Personal Security to Systems Security
- Sanctum: Firewalls for browsers
- "You idiot!"
- Imperva: A firewall for websites
- The man who walked away
- The love letter that leaked: CyberArk and the digital wallet
- Cyber: A booming market
- Chapter 7 From Security to Defense-The Cyber "Iron Dome"
- The turning point of 2010
- Paradigm shift
- From inertia to growth
- Chapter 8 The Best Defense-"Daddy, What Do You Do?"
- The birth of an idea
- Rise and fall
- Chapter 9 From Crisis to Crisis-Israeli Cyber Grows Up
- Safe browsing: Island &
- Co.
- The massive switch to networks
- Is the bubble about to burst?
- Section 3 Offensive Cybersecurity
- Chapter 10 Reaching Through the Darkness: NSO and Zero-Click Disruption
- The cyberblacklist
- The birth of a revolution
- The breakthrough
- Chapter 11 In the Right Hands-The Israeli Companies That Stretched the Boundaries of Possibility
- Candiru: The covert company
- Surveillance van hacking: The story of Intellexa
- Chapter 12 Criticism of Offensive Cybertechnology
- The enemy of offensive cybertechnology
- Bad publicity
- Between privacy and security
- The sales dilemma.
- Chapter 13 Selling to the Good Guys-Regulation, Self-Criticism, and "Clean" Offensive Cybertechnology
- The Israeli regulator
- Offensive cyber as a geopolitical tool
- Final reflections
- Section 4 Building a Cyberstate
- Chapter 14 The Israeli Silicon Valley-Small State, Big Data
- Chapter 15 Unit 8200-Secrets of the IDF's Success
- "We've got to go up a notch"
- The story of Unit 8200
- Unit 81: Making the impossible, possible
- Cyberintelligence: Challenges and opportunities
- Building the Israeli military's cybersecurity apparatus
- The ARAM Course
- From offense to defense
- The key to success
- Overcoming any obstacle
- The old boys' club
- Closed club?
- Chapter 16 A Professor and a Hacker-Academia and Cybersecurity
- Chapter 17 Free Hand or Bear Hug-The State's Role in the World of Innovation
- The Yozma Program: Government-funded venture capital
- The innovation and bureaucracy authority
- Capital of the Negev, capital of cybersecurity
- Just keep out of the way
- The prime minister's agenda
- Chapter 18 Small and Nimble-Being a Small Island-Nation in the Middle East Is Not Such a Bad Start
- Hackathons lead to global thinking
- The "American Dream"
- Backs against the wall
- Two degrees of separation
- Chapter 19 "Bro"-What Makes Israel's Culture an Incubator of Cybersecurity Innovation?
- The "Jewish genius"
- The culture of mutual assistance
- The pioneers
- Our ambassadors abroad
- Chapter 20 The Cybersecurity Industry Snowball Effect-Elements of the Israeli Ecosystem
- Made in Israel venture capital
- Venture capital discovers the cyberindustry
- Venture capital and offensive cyber
- The entrepreneur community's fund
- The well-trodden path
- Angel capital
- International corporations
- From start-up nation to exit nation
- Importing knowledge
- Living the good life?.
- When Israel gains kudos
- "Israel is one of our advantages"
- Cybertourism
- The cyberstate: The secret sauce
- Conclusion: Where Is Everything Going?
- Notes
- The Ten Commandments of the Budding Entrepreneur
- Index
- EULA.