Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000nim a22004455a 4500 
003    MWT 
005    20200930103551.1 
006    m     o  h         
007    sz zunnnnnuned 
007    cr nnannnuuuua 
008    190512s2019    xxunnn es      i  n eng d 
020    9781982622411 (sound recording : hoopla Audio Book) 
020    1982622415 (sound recording : hoopla Audio Book) 
029    https://d2snwnmzyr8jue.cloudfront.net/
       bsa_9781982622411_180.jpeg 
028 42 MWT12254704 
037    12254704|bMidwest Tape, LLC|nhttp://www.midwesttapes.com 
040    Midwest|erda 
082 04 364.16/8|223 
099    eAudiobook hoopla 
099    eAudiobook hoopla 
100 1  Wolff, Josephine,|eauthor. 
245 10 You'll see this message when it is too late :|bthe legal 
       and economic aftermath of cybersecurity breaches|h[Hoopla 
       electronic resource] /|cJosephine Wolff. 
250    Unabridged. 
264  1 [United States] :|bBlackstone Publishing,|c2019. 
264  2 |bMade available through hoopla 
300    1 online resource (1 audio file (14hr., 01 min.)) :
       |bdigital. 
336    spoken word|bspw|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
344    digital|hdigital recording|2rda 
347    data file|2rda 
506    Digital content provided by hoopla. 
511 0  Read by Kate Reading. 
520    Cybersecurity incidents make the news with startling 
       regularity. Each breach (the theft of 145.5 million 
       Americans' information from Equifax, for example, or the 
       Russian government's theft of National Security Agency 
       documents, or the Sony Pictures data dump) makes headlines,
       inspires panic, instigates lawsuits, and is then 
       forgotten. The cycle of alarm and amnesia continues with 
       the next attack, and the one after that. In this book, 
       cybersecurity expert Josephine Wolff argues that we 
       shouldn't forget about these incidents, we should 
       investigate their trajectory, from technology flaws to 
       reparations for harm done to their impact on future 
       security measures. We can learn valuable lessons in the 
       aftermath of cybersecurity breaches.  Wolff describes a 
       series of significant cybersecurity incidents between 2005
       and 2015, mapping the entire life cycle of each breach in 
       order to identify opportunities for defensive 
       intervention. She outlines three types of motives 
       underlying these attacks (financial gain, espionage, and 
       public humiliation of the victims) that have remained 
       consistent through a decade of cyberattacks, offers 
       examples of each, and analyzes the emergence of different 
       attack patterns. The enormous TJX breach in 2006, for 
       instance, set the pattern for a series of payment card 
       fraud incidents that led to identity fraud and extortion; 
       the Chinese army conducted cyberespionage campaigns 
       directed at US-based companies from 2006 to 2014, sparking
       debate about the distinction between economic and 
       political espionage; and the 2014 breach of the Ashley 
       Madison website was aimed at reputations rather than bank 
       accounts. 
538    Mode of access: World Wide Web. 
650  0 Computer crimes|xPrevention. 
700 1  Reading, Kate,|enarrator. 
710 2  hoopla digital. 
856 40 |uhttps://www.hoopladigital.com/title/
       12254704?utm_source=MARC|zInstantly available on hoopla. 
856 42 |zCover image|uhttps://d2snwnmzyr8jue.cloudfront.net/
       bsa_9781982622411_180.jpeg