"Keeping Up" as a quick, fun, and accessible guide to the current state of the tech industry and the big trends that will likely define its future. We'll discuss, at a high level, the major drivers of technology innovation and investment, and how it all interfaces with everything else. If you're responsible for making technology-based business decisions, looking for inspiration for new opportunities, thinking about a new career, or just curious about the world around you, getting all this information in one place can make for more intelligent and faster decisions.
Who might want to read this book?
⢠Managers and business decision makers
⢠Individuals plotting their career/educational trajectories
⢠Individuals looking for ideas/inspiration for new or undefined projects
⢠Curious people seeking to understand their world
⢠Journalists looking for quick context
"Keeping Up" as a quick, fun, and accessible guide to the current state of the tech industry and the big trends that will likely define its future. We'll discuss, at a high level, the major drivers of technology innovation and investment, and how it all interfaces with everything else. If you're responsible for making technology-based business decisions, looking for inspiration for new opportunities, thinking about a new career, or just curious about the world around you, getting all this information in one place can make for more intelligent and faster decisions.
Who might want to read this book?
⢠Managers and business decision makers
⢠Individuals plotting their career/educational trajectories
⢠Individuals looking for ideas/inspiration for new or undefined projects
⢠Curious people seeking to understand their world
⢠Journalists looking for quick context
Whatever your connection to technology, security should play a prominent role in the way you think and act. Technology, after all, amplifies the impact of everything we do with it:
The things we say and write using communication technologies can be read and heard by many, many more people than would be possible without.
The ability to conveniently connect with people and collaborate on projects of all kinds is much greater.
The tasks we can perform are, through the magic of automation, almost limitless.
The scope of information we can instantly access through the simplest and least expensive devices towers far beyond anything the greatest scholars could have hoped to see in a lifetime just a few decades ago.
All that means that criminals and other individuals unconstrained by moral conscience will have yet more powerful tools to compromise the data you create and consume, and steal or damage the property you acquire. So youâve got a strong interest in learning how to protect yourself, your property, and that of the people and organizations around you.
This chapter will present a brief overview of whatâs at stake in the technology security domain. Weâll define the kinds of threats we face and discuss the key tools at our disposable for pushing back against those threats.
Hacking? Whatâs hacking?
Defining computer hacking in a way that doesnât anger someone, somewhere, is like talking about politics at work. Be prepared for long, awkward silences and possibly violence.
You see, purists might insist that the term hacking should apply exclusively to individuals focused on forcibly re-purposing computer hardware for non-standard purposes. Others reserve the title for people who bypass authentication controls to break into networks for criminal or political purposes. And how about those who wear the title as a sign of their practical expertise in all things IT? (And then, of course, there are crackers.)
But this is my book, so Iâm going to use the term any way I want. I therefore decree that hacking is all about plans the bad guys have for your digital devices. Specifically, their plans to get in without authorization, get out without being noticed, and (sometimes) take your stuff with them when they leave. Using the term this way gives us a useful way to organize a discussion of some common and particularly scary threats.
How hackers get in
The trick is to find a way through your defenses (like passwords, firewalls, and physical barriers). In most cases, passwords probably provide the weakest protection:
Passwords are often short, use a narrow range of characters, and are easy to guess.
If a device came with a simple factory default password (like âadminâ or â1234â) just intended to get you in for the first time, then the odds are pretty good that many users will never get around to trading it in for something better.
Even strong passwords can be stolen by deceptive phishing email scams (âClick here to login to your bank accountâŚâ); social engineering (âHi, itâs Ed from IT. Weâre having some trouble with your corporate account. Would you mind telling me your password over the phone so I can quickly fix it?â); and keyboard tracking software.
Weâll talk more about firewalls later in this chapter. And physical barriers? I think you already know what a locked door looks like. But itâs probably worth spending a few moments thinking about other kinds of digital attack.
The big prize is usually getting to your data and making off with copies. But for some, simply destroying the originals can be just as satisfying.
Obviously, logging into your devices using stolen passwords is the most straightforward approach. But access can also be achieved by intercepting your data as it travels across an insecure network.
One approach thatâs commonly used here is known as a man-in-the-middle attack, where data packets can be intercepted in transit and altered without authorized users at either end knowing anythingâs wrong. Properly encrypting your network connections (and avoiding unsafe public networks altogether) is an effective protection against this kind of threat. Weâll talk more about encryption a bit later.
If the hardware youâre using has an undocumented âback doorâ built in, then youâre pretty much toast whatever you do. Weâll talk more about back doors later in the book but, for now, Iâll just note that there have been no shortage of factory-supplied laptops, rack servers, and even high-end networking equipment thatâs been intentionally designed to include serious access vulnerabilities. Be very careful where you purchase your compute devices.
If the attackers find a way into your physical building (sometimes posing as employees of a delivery company), they could quietly plug a tiny listening device into on unused ethernet jack on your network. Thatâll give them a nice platform to watch and even influence all your activities from the inside. Protecting your physical infrastructure and carefully monitoring network activity is your best hope against that kind of intrusion.
Even if your home or office is all fortressed up, thereâs no guarantee that data moving around on mobile devices (like smartphones or laptops) wonât find its way into the wrong hands. And even if youâve been careful to use only the best passwords for those devices, the data drives themselves can still be easily mounted as external partitions on a thiefâs own machine. Once mounted, your files and account information will now be wide open.
The only way to protect your mobile devices from this kind of threat is to encrypt the entire drive using a strong passphrase.
What hackers are after
Now that entire economies are run on computers directly connected to public networks, thereâs money and value to be had through well-planned corporate, academic, or political espionage effortsâŚand through old fashioned, traditional theft. Whether the goal is building up a military or commercial competitive advantage, completely destroying the competition, or just getting your hands on âfreeâ money, illegally accessing other peopleâs data has never been easier.
So what are hackers likely to be after? All the important financial and other sensitive information youâd prefer they didnât have. Including, it should be noted, the kind of information you use to identify yourself to banks, credit card companies, and government agencies.
Once the bad guys have got important data points like your birth date, home address, government-issued ID numbers, and some basic banking details, itâs usually not hard for them to present themselves as though theyâre you, completely taking over your identity in the process.
Digital attacks can also be used as blackmail to force victims to pay to undo the damage thatâs been done. Thatâs the objective of most ransomware attacks, where hackers encrypt all the data on a victimâs computers and refuse to send the decryption keys needed to restore your rightful access unless you send them lots of money. Such attacks have already effectively brought down critical infrastructure like the IT systems powering hospitals and cities.
The very best defense against ransomware is to have full and tested backups of your critical data and a reliable system for quickly restoring it to your hardware. That way, if youâre ever hit with a ransomware attack, you can simply wipe out your existing software and replace it with fresh copies, populated with your backed up data. But you should also beef up your general security settings to make it harder for ransomware hackers to get into your system in the first place.
When their primary goal is to prevent you or your organization from going about its business, hackers can remain at a safe distance and launch a distributed denial of service (DDoS) attack against your web infrastructure. Historical DDoS attacks have used massive swarms of thousands of illegally hijacked network-connected devices to transmit crippling numbers of requests against a single target service.
When large enough, DDoS attacks have managed to bring down even huge enterprise-scale companies using sophisticated defenses for hours at a time. The site hosting one of my favorite online open source collections was hit hard more than a year ago and still hasnât fully recovered.
What is encryption?
If your data is unreadable, thereâs a lot less bad stuff that unauthorized individuals will be able to do with it. But if itâs unreadable, thereâs probably not a whole lot youâll be able to do with it either. Wouldnât it be nice if there was some way to present your data as unreadable in every scenario except where thereâs a legitimate reason? Well waddaya know? There is, and itâs called data encryption.
Encrypting data in transit
Encryption algorithms encode information in a way that makes it hard, or even impossible, to be read. A simple (and ancient) example is symbol replacement, where every letter âaâ in a message would be replaced with, say, the letter three positions on in the alphabet (which would be âdâ). Every âbâ would become âeâ and so on. âHello worldâ would be âkhoor zruogâ. People subsequently coming across the message would be unable to understand it.
Of course, it wouldnât take long for a modern computer (or even a smart 8-year-old) to decode that one. But some very clever cryptologists have been working hard over most of the past century to produce much more effective algorithms. There are some significant variations of modern cryptography, but the general idea is that people can apply an encryption algorithm to their data and then safely transmit the encrypted copy over insecure networks so the recipient can then apply a decryption key of some sort to the data, restoring the original version.
Encryption is now widely available for many common activities, including sending and receiving emails. You can similarly ensure that the data you request from a website is the same data thatâs eventually displayed in your browser by checking the lock icon in your browserâs address bar. The icon confirms that the website server employs Transport Layer Security (TLS) encryption.
Over the past few years, the Letâs Encrypt project (letsencrypt.org) has encouraged millions of new websites to use encryption by provided free encryption certificates and simple-to-use tools to help server administrators install them.
Encrypting data at rest
TLS will protect your data when itâs out and about, but whatâll keep it safe even when itâs relaxing in its comfy storage disk? File and drive encryption, thatâs what. All operating systems now offer integrated software for encrypting all or part of a storage disk either at installation time or later. Each time you power up an encrypted disk, youâll be prompted to enter the passphrase you created when you enabled encryption.
The thing is that if you forget your passphrase youâre pretty much permanently locked out of your system and the data is as good as gone forever. But the other thing is that if you donât encrypt your system then, as we noted earlier, anyone who steals the hardware will have easy and instant access to your private information. Itâs a tough world out there, isnât it?
What does a firewall do?
You can think of a firewall as a filter. Just like, say, a water filter is able to block certain impurities, allowing only clean water through, a firewall can inspect every packet of data coming into or leaving your infrastructure, blocking access where appropriate.
Besides not needing to be replaced every few weeks, the big advantage of a firewall over a water filter is that it can be closely configured to permit and refuse entry to exactly match your security and functional needs, and then updated later should your needs change.
Hardware firewalls
A hardware firewall is a purpose-built physical networking device thatâs commonly used within enterprise environments. Such firewalls are installed at the edge of a private network and set to:
Block potentially dangerous incoming traffic.
Redirect other traffic to remote destinations:.
Permit traffic to access hosts within the local network.
Hardware firewalls are sold by companies like Cisco and Juniper, and general equipment manufacturers like HP and Dell. and can be used to manage traffic for networks encompassing many thousands of hosts. Firewalling appliances tend to be very expensive, often costing many thousands of dollars each. Theyâre normally only deployed to manage enterprise infrastructure.
Software firewalls
A software firewall is an application that runs on a regular PC that can perform just about any function that youâd otherwise expect from a hardware firewall. There are two important differences:
Firewall software (like the Linux iptables utility) is often free and, while complicated, enjoys the benefits of vast documentation resources. The software can also be installed any old PC thatâs just lying around, reducing the overall cost to nearly nothing.
You wonât want to use such a firewall within a busy business environment however, since such a PC probably wonât have the compute power to manage high volumes of network traffic. Nor, in most such cases, will it be reliable enough to provide mission-critical services 24/7.
Thereâs another flavor of software firewall thatâs used as part of consumer-grade operating systems. Such firewalls allow you to better secure your OS by setting rules for what kind of activities you want to allow. These can be especially useful for mobile devices that frequently move from network to network.
Cloud computing platforms - like Amazon Web Services (AWS) and Microsoftâs Azure - provide a firewall-like technology for use with the resources you might deploy within their systems. Firewall policies might exist in entities with names like âsecurity groupâ or âaccess control listâ that can be applied to whichever resource requires them.
Who does security best?
In the not too distant past, you would often hear IT professionals swearing they would never run their IT operations on infrastructure they didnât physically control. This was common when referring to outsourcing to third party, offsite companies or to cloud computing platforms. Whether it was because those administrators didnât trust the reliability and security of compute infrastructure run by strangers, or because regulatory restrictions required that sensitive workloads remained local, the sentiment was widely shared. And it made sense.
But the past is a different world. Today, it can be forcefully argued, the most secure and reliable environments are found in the biggest public cloud providers. Why? Theyâve got the money and incentive to hire the very best engineers, and the money and incentive to build the very best infrastructure. Beyond that, cloud providers maintain data centers in political jurisdictions around the world, and go to great lengths to ensure their deployments comply with industry and government standards.
Let me illustrate. Remember a bit earlier in the chapter when we discussed DDoS threats? Well, back in the summer of 2020, an unnamed organization deploying resources on AWS was hit with a DDoS attack peaking at 2.3 Tbps. That is, each and every second, requests hit that organizationâs public-facing service with 2.3 terabytes of data.
What does â2.3 terabytesâ actually mean? Well, a megabyte is (approximately) one million bytes of information (a PDF version of this book would probably take up six megabytes or so). A gigabyte is one thousand million bytes of information. A terabyte is one thousand thousand million bytes of information. That would be the equivalent of around 165,000 PDF books. 2.3 terabytes would be the rough equivalent of 380,000 PDF books.
Now try to imagine all the text characters used to fill 380,000 PDF books being thrown at a web service each second.
Got that image in your mind? So hereâs what happened to that web service: Nothing. It just carried on working as though it hadnât a care in the world. How on earth is that even possible? Amazonâs AWS Shield service simply mitigated the attack. The customer didnât have to do a thing.
That is why moving your workloads to the public cloud doesnât necessarily involve compromising your standards.
Interested in digging deeper into this topic? My Linux Security Fundamentals book (Sybex, 2020) is entirely devoted to giving you the full picture. Even if you donât actually happen to work with Linux, thereâs enough platform-neutral content there to keep you good and busy.
I picked up this book because it talks about technology concepts that I want to understand better. I read about the Cloud, IoT, blockchain, cryptocurrency, artificial intelligence (AI), and machine learning (ML) in articles and newspaper reports but I don't really know what they mean. This book explains all these terms and other technology-related concepts lucidly.
I'll be honest: I don't understand everything fully after reading the book, but these concepts are certainly much clearer to me now!
The author has simplified the concepts to a certain extent to enable technologically-challenged people like me to understand them, but you'll still need to pay close attention to grasp what's being discussed.
I felt a sense of helplessness because the digital world seems beset by so many different types of threats. I'm just a regular computer user and I never thought it could be so dangerous to do anything online. But, the future is digital and there's no escaping these technologies. So the best way to fight off these threats is to educate yourself as much as you can.
I found Chapter 4: Understanding Digital Connectivity to be the most interesting. It talks about the Internet of Things and its applications in the military, smart homes, smart cities, etc. It also talks about the problems that IoT technology poses.
I also enjoyed reading Chapter 10 regarding big data, virtual reality, augmented reality, artificial intelligence, neural networks, and machine learning. I occasionally read about these things on other platforms so it's nice to have some background about them. It's a brief introduction but it's good for beginners like myself.
The book is written in a friendly, straightforward tone and should appeal to just about anybody who wants to learn more about the latest trends in technology, the benefits, the threats, and the solutions. You can read the book in any order you want--I picked the chapters that caught my eye first such as chapter 4 and chapter 10.