ABSTRACT

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

part I|2 pages

The 1980s

chapter 1|8 pages

Kevin Mitnick

chapter 2|4 pages

The 414s

chapter 3|4 pages

Legion of Doom

chapter 4|6 pages

Chaos Computer Club

chapter 5|4 pages

Fry Guy

chapter 6|4 pages

Fred Cohen

chapter 7|4 pages

Morris Worm (Internet Worm)

part II|2 pages

The 1990s

chapter 8|4 pages

Nahshon Even-Chaim

chapter 9|4 pages

Masters of Deception

chapter 10|4 pages

Operation Sun Devil

chapter 12|4 pages

Ehud Tenenbaum

chapter 13|2 pages

The Brotherhood of Warez

part III|2 pages

The 2000s

chapter 14|2 pages

Mafiaboy

chapter 15|10 pages

Operation Shady RAT—2006

chapter 16|4 pages

Night Dragon—2006

chapter 17|10 pages

Zeus—2007

chapter 18|4 pages

Operation Aurora—2009

chapter 19|6 pages

Stuxnet—2010

chapter 20|8 pages

Operation Potao Express—2011

chapter 21|6 pages

Saudi Aramco—2012

chapter 22|6 pages

Target Data Breach—2013

chapter 23|4 pages

Neiman Marcus—2013

chapter 24|4 pages

Michaels Attack—2013

chapter 25|2 pages

P.F. Chang—2013

chapter 26|4 pages

Havex—2014

chapter 27|4 pages

Shellshock—2014

chapter 28|8 pages

Heartbleed—2014

chapter 29|4 pages

Unicorn Bug—2014

chapter 30|4 pages

Home Depot—2014

chapter 31|4 pages

Sally Beauty Breach—2014

chapter 32|4 pages

Goodwill—2014

chapter 33|4 pages

Supervalu—2014

chapter 34|4 pages

UPS—2014

chapter 35|4 pages

Jimmy John’s—2014

chapter 36|4 pages

Dairy Queen—2014

chapter 37|2 pages

Staples—2014

chapter 38|2 pages

Kmart—2014

chapter 39|4 pages

Sony Pictures—2014

chapter 40|4 pages

JPMorgan Chase—2014

chapter 41|6 pages

Anthem Healthcare Attack—2015

chapter 42|6 pages

Ashley Madison Data Breach—2015

chapter 43|8 pages

BlackEnergy—2015

chapter 44|4 pages

Sandworm—2015

chapter 45|2 pages

HSBC Online Cyber-Attack—2016

chapter 46|4 pages

Panama Papers—2016