skip to content
The death of the Internet Preview this item
ClosePreview this item
Checking...

The death of the Internet

Author: Markus Jakobsson
Publisher: Hoboken, N.J. : IEEE Press : IEEE Computer Society : Wiley : Higher Education Press, [2012] ©2012
Edition/Format:   Book : EnglishView all editions and formats
Database:WorldCat
Summary:
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Markus Jakobsson
ISBN: 9781118062418 1118062418
OCLC Number: 758385617
Description: xxiv, 361 pages : illustrations ; 24 cm
Contents: pt. I. The problem. 1. What could kill the Internet? And so what? --
2. It is about people. Human and social issues / Markus Jakobsson : Nigerian scams ; Password reuse ; Phishing --
Who are the criminals? / Igor Bulavko : Who are they? ; Where are they? ; Deep-dive: taking a look at ex-Soviet hackers ; Let's try to find parallels in the world we live in ; Crime and punishment? --
3. How criminals profit. Online advertising fraud / Nevena Vratonjic, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux : Advertising on the Internet ; Exploits of online advertising systems ; Click fraud ; Malvertising: spreading malware via ads ; Inflight modification of ad traffic ; Adware: unsolicited software ads --
Toeing the line: legal but deceptive service offers / Markus Jakobsson and Ruilin Zhu : How does it work? ; What do they earn? --
Phishing and some related attacks / Markus Jakobsson and William Leddy : The problem is the user ; Phishing ; Man-in-the-middle ; Man-in-the-browser ; New attack: man-in-the-screen --
Malware: current outlook / Members of the BITS Security Working Group and staff leads Greg Rattray and Andrew Kennedy : Malware evolution ; Malware supply and demand --
Monetization / Markus Jakobsson : There is money everywhere --
4. How things work and fail. Online advertising: with secret security / Markus Jakobsson : What is a click? ; How secret filters are evaluated ; What do fraudsters know? --
Web security remediation efforts / Jeff Hodges and Andy Steingruebl : The multitude of web browser security mechanisms ; Where do we go from here? --
Content-sniffing XSS attacks: XSS with non-HTML content / Juan Caballero, Adam Barth, and Dawn Song : Content-sniffing XSS attacks ; Defenses --
Our Internet infrastructure at risk / Garth Bruen : The political structure ; The domain ; WHOIS: ownership and technical records ; Registrars: sponsors of domain names ; Registries: Sponsors of domain extensions ; CCTLDs: the sovereign domain extensions ; ICANN: the main Internet policy body --
Social spam / Dimitar Nikolov and Filippo Menczer : Motivations for spammers ; Case study: Spam in the GiveALink bookmarking system ; Web pollution ; The changing nature of social spam: content farms --
Understanding CAPTCHAs and their weaknesses / Elie Bursztein : What is a captcha? ; Types of captchas ; Evaluating captcha attack effectiveness ; Design of captchas ; Automated attacks ; Crowd-sourcing: using humans to break captchas --
Security questions / Ariel Rabkin : Vulnerabilities ; Variants and possible defenses --
Folk models of home computer security / Rick Wash and Emilee Rader : The relationship between folk models and security ; Folk models of viruses and other malware ; Folk models of hackers and break-ins ; Following security advice ; Lessons learned --
Detecting and defeating interception attacks against SSL / Christopher Soghoian and Sid Stamm : Certificate authorities and the browser vendors ; Big Brother in the browser ; Compelled assistance ; Surveillance appliances ; Protecting users ; Threat model analysis ; Related work --
5. The mobile problem. Phishing on mobile devices / Adrienne Porter Felt and David Wagner : The mobile phishing threat ; Common control transfers ; Phishing attacks ; Web sender [arrow] mobile target ; Web sender [arrow] web target ; Attack prevention --
Why mobile malware will explode / Markus Jakobsson and Mark Grandcolas : Nineteen eighty-six: when it all started ; A glimpse of users ; Why market size matters ; Financial trends ; Mobile malware outlook --
Tapjacking: stealing clicks on mobile devices / Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh : Framing attacks ; Phone tapjacking ; Framing Facebook ; Summary and recommendations --
6. The Internet and the physical world. Malware-enabled wireless tracking networks / Nathaniel Husted and Steven Myers : The anatomy of a modern smartphone ; Mobile tracking networks: a threat to smartphones --
Social networking leaks / Mayank Dhiman and Markus Jakobsson : Motivations for using social networking sites ; Trust and privacy ; Known issues ; Case study: Social networking leaks in the physical world --
Abuse of social media and political manipulation / Bruno Gonç̐alves, Michael Conover, and Filippo Menczer : The rise of online grassroots political movements ; Spam and astroturfing ; Deceptive tactics ; The truthy system for astroturf detection --
pt. II. Thinking about solutions. 7. Solutions to the problem. When and how to authenticate / Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song : Problem description ; Use cases ; System architecture ; User privacy ; Machine learning/algorithms ; User study --
Fastwords: adapting passwords to constrained keyboards / Markus Jakobsson and Ruj Akavipat : The principles behind fastwords ; Basic feature set ; Extended feature set ; Sample stories and frequencies ; Recall rates ; Security analysis ; The security of passwords ; Entry speed ; Implementation of fastword entry --
Deriving PINs from passwords / Markus Jakobsson and Debin Liu : A brief discussion of passwords ; How to derive PINs from passwords ; Analysis of passwords and derived PINs ; Security analysis ; Usability experiments --
Visual preference authentication / Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir : Password resets ; Security questions aren't so secure ; What is visual preference-based authentication ; Evaluating visual preference-based authentication ; Case study: visual Blue Moon authentication --
The deadly sins of security user interfaces / Nathan Good : Security applications with frustrating user interfaces ; The four sins of security application user interfaces ; Consumer choice: a security bugbear ; Security by verbosity ; Walls of checkboxes ; All or nothing switch --
SpoofKiller: let's kiss spoofing goodbye! / Markus Jakobsson and William Leddy : A key to the solution: interrupts ; Why can the user log in to good sites, but not bad ones? ; What about sites that are good but not certified good? ; SpoofKiller: under the hood ; Say we implement SpoofKiller: then what? --
Device identification and intelligence / Ori Eisen : 1995-2001: the early years of device identification ; 2001-2008: tagless device identification begins ; 2008-present: private browsing and beyond --
How can we determine if a device is infected or not? / Aurélien Francillon, Markus Jakobsson, and Adrian Perrig : Why detection is difficult ; Setting up an isolated environment ; What could go wrong? ; Brief comparison with TrustZone --
8. The future. Security needs the best user experience / Hampus Jakobsson : How the user won over features ; So how come the iPhone became so successful ; A world of information anywhere ; Midas' touch screens ; New input, new opportunities ; Zero-click and real-life user interfaces ; Privacy and user interfaces ; It all comes together --
Fraud and the future / Markus Jakobsson.
Responsibility: edited by Markus Jakobsson.

Abstract:

Covering internet security, malware, phishing, and how to combat these serious and growing issues on both desktop and smart phone platforms, this book draws upon state-of-the-art research from  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"For those looking for a book to gain situation awareness about the dangers of the Internet, one is hard pressed to find a better title than The Death of the Internet." ( Word Virus , 17 April 2013) Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(5)

User lists with this item (3)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/758385617>
library:oclcnum"758385617"
library:placeOfPublication
owl:sameAs<info:oclcnum/758385617>
rdf:typeschema:Book
schema:about
schema:about
<http://id.worldcat.org/fast/1751426>
rdf:typeschema:Intangible
schema:name"Internet--Security measures"@en
schema:name"Internet--Security measures."@en
schema:about
<http://id.worldcat.org/fast/906919>
rdf:typeschema:Intangible
schema:name"Electronic commerce--Security measures"@en
schema:name"Electronic commerce--Security measures."@en
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:contributor
schema:datePublished"2012"
schema:description""Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them"--"@en
schema:description"pt. II. Thinking about solutions. 7. Solutions to the problem. When and how to authenticate / Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka, Jesus Molina, Yuan Niu, and Jeff Song : Problem description ; Use cases ; System architecture ; User privacy ; Machine learning/algorithms ; User study -- Fastwords: adapting passwords to constrained keyboards / Markus Jakobsson and Ruj Akavipat : The principles behind fastwords ; Basic feature set ; Extended feature set ; Sample stories and frequencies ; Recall rates ; Security analysis ; The security of passwords ; Entry speed ; Implementation of fastword entry -- Deriving PINs from passwords / Markus Jakobsson and Debin Liu : A brief discussion of passwords ; How to derive PINs from passwords ; Analysis of passwords and derived PINs ; Security analysis ; Usability experiments -- Visual preference authentication / Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir : Password resets ; Security questions aren't so secure ; What is visual preference-based authentication ; Evaluating visual preference-based authentication ; Case study: visual Blue Moon authentication -- The deadly sins of security user interfaces / Nathan Good : Security applications with frustrating user interfaces ; The four sins of security application user interfaces ; Consumer choice: a security bugbear ; Security by verbosity ; Walls of checkboxes ; All or nothing switch -- SpoofKiller: let's kiss spoofing goodbye! / Markus Jakobsson and William Leddy : A key to the solution: interrupts ; Why can the user log in to good sites, but not bad ones? ; What about sites that are good but not certified good? ; SpoofKiller: under the hood ; Say we implement SpoofKiller: then what? -- Device identification and intelligence / Ori Eisen : 1995-2001: the early years of device identification ; 2001-2008: tagless device identification begins ; 2008-present: private browsing and beyond -- How can we determine if a device is infected or not? / Aurélien Francillon, Markus Jakobsson, and Adrian Perrig : Why detection is difficult ; Setting up an isolated environment ; What could go wrong? ; Brief comparison with TrustZone -- 8. The future. Security needs the best user experience / Hampus Jakobsson : How the user won over features ; So how come the iPhone became so successful ; A world of information anywhere ; Midas' touch screens ; New input, new opportunities ; Zero-click and real-life user interfaces ; Privacy and user interfaces ; It all comes together -- Fraud and the future / Markus Jakobsson."@en
schema:description"pt. I. The problem. 1. What could kill the Internet? And so what? -- 2. It is about people. Human and social issues / Markus Jakobsson : Nigerian scams ; Password reuse ; Phishing -- Who are the criminals? / Igor Bulavko : Who are they? ; Where are they? ; Deep-dive: taking a look at ex-Soviet hackers ; Let's try to find parallels in the world we live in ; Crime and punishment? -- 3. How criminals profit. Online advertising fraud / Nevena Vratonjic, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux : Advertising on the Internet ; Exploits of online advertising systems ; Click fraud ; Malvertising: spreading malware via ads ; Inflight modification of ad traffic ; Adware: unsolicited software ads -- Toeing the line: legal but deceptive service offers / Markus Jakobsson and Ruilin Zhu : How does it work? ; What do they earn? -- Phishing and some related attacks / Markus Jakobsson and William Leddy : The problem is the user ; Phishing ; Man-in-the-middle ; Man-in-the-browser ; New attack: man-in-the-screen -- Malware: current outlook / Members of the BITS Security Working Group and staff leads Greg Rattray and Andrew Kennedy : Malware evolution ; Malware supply and demand -- Monetization / Markus Jakobsson : There is money everywhere -- 4. How things work and fail. Online advertising: with secret security / Markus Jakobsson : What is a click? ; How secret filters are evaluated ; What do fraudsters know? -- Web security remediation efforts / Jeff Hodges and Andy Steingruebl : The multitude of web browser security mechanisms ; Where do we go from here? -- Content-sniffing XSS attacks: XSS with non-HTML content / Juan Caballero, Adam Barth, and Dawn Song : Content-sniffing XSS attacks ; Defenses -- Our Internet infrastructure at risk / Garth Bruen : The political structure ; The domain ; WHOIS: ownership and technical records ; Registrars: sponsors of domain names ; Registries: Sponsors of domain extensions ; CCTLDs: the sovereign domain extensions ; ICANN: the main Internet policy body -- Social spam / Dimitar Nikolov and Filippo Menczer : Motivations for spammers ; Case study: Spam in the GiveALink bookmarking system ; Web pollution ; The changing nature of social spam: content farms -- Understanding CAPTCHAs and their weaknesses / Elie Bursztein : What is a captcha? ; Types of captchas ; Evaluating captcha attack effectiveness ; Design of captchas ; Automated attacks ; Crowd-sourcing: using humans to break captchas -- Security questions / Ariel Rabkin : Vulnerabilities ; Variants and possible defenses -- Folk models of home computer security / Rick Wash and Emilee Rader : The relationship between folk models and security ; Folk models of viruses and other malware ; Folk models of hackers and break-ins ; Following security advice ; Lessons learned -- Detecting and defeating interception attacks against SSL / Christopher Soghoian and Sid Stamm : Certificate authorities and the browser vendors ; Big Brother in the browser ; Compelled assistance ; Surveillance appliances ; Protecting users ; Threat model analysis ; Related work -- 5. The mobile problem. Phishing on mobile devices / Adrienne Porter Felt and David Wagner : The mobile phishing threat ; Common control transfers ; Phishing attacks ; Web sender [arrow] mobile target ; Web sender [arrow] web target ; Attack prevention -- Why mobile malware will explode / Markus Jakobsson and Mark Grandcolas : Nineteen eighty-six: when it all started ; A glimpse of users ; Why market size matters ; Financial trends ; Mobile malware outlook -- Tapjacking: stealing clicks on mobile devices / Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh : Framing attacks ; Phone tapjacking ; Framing Facebook ; Summary and recommendations -- 6. The Internet and the physical world. Malware-enabled wireless tracking networks / Nathaniel Husted and Steven Myers : The anatomy of a modern smartphone ; Mobile tracking networks: a threat to smartphones -- Social networking leaks / Mayank Dhiman and Markus Jakobsson : Motivations for using social networking sites ; Trust and privacy ; Known issues ; Case study: Social networking leaks in the physical world -- Abuse of social media and political manipulation / Bruno Gonç̐alves, Michael Conover, and Filippo Menczer : The rise of online grassroots political movements ; Spam and astroturfing ; Deceptive tactics ; The truthy system for astroturf detection --"@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1164467569>
schema:inLanguage"en"
schema:name"The death of the Internet"@en
schema:url
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.