Zero Day_ A Novel - Mark Russinovich [0]
Mark Russinovich is recognized by many as the world’s leading expert on the Windows operating system. His tools are used worldwide by corporations and government agencies not only to keep their IT systems running, but to perform advanced forensics.
In this book, Mark has woven a compelling tale about an imminent threat to every person, household, corporation, and government that relies on technology and the systems that we depend on. While what Mark wrote is fiction, the risks that he writes about eerily mirror many situations that we see today. Clearly, we are more and more dependent than ever on Internet-connected computer systems: it is the way we communicate, do our banking, pay our taxes, book our travel, and buy merchandise. We take for granted that these systems will always be there and are set to protect our privacy and are secure. The strength of the Internet and Internet technologies is that we are so connected. However, this strength is also a weakness—these systems are vulnerable to attack from anywhere by anyone, and with little capital investment. The Internet also facilitates maintaining anonymity, on which many of us depend, but often creates a fertile ground for bad actors. As Mark’s story unfolds, we see the hacker creating superviruses hiding behind many layers of virtual disguises, which make fixing the problem even more complicated and dangerous.
For too many years, we have heard cyber-security experts saying that we need to have more security, we need to use antivirus, we need to use anti-spyware, back up our systems, use firewalls, and be vigilant about what documents we open, links we click on, and programs we execute. These and other technologies help protect a system or small network, but do not necessarily protect the overall environment that weaves through the very fabric of the Internet, touching all of us. Mark has created a unique work that is not only entertaining but a call to action as well. This is a great read and a forward-looking picture of what we need to avoid.
I hope stories such as Zero Day remain just that—great reads that will hopefully never come true.
PROFESSOR HOWARD A. SCHMIDT
PRESIDENT AND CEO, INFORMATION SECURITY FORUM LTD.
WHITE HOUSE CYBER SECURITY COORDINATOR
CONTENTS
Foreword
Title Page
Memorandum
Week One
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Week Two
Chapter 22
Chapter 23
Chapter 24
Chapter 25
Chapter 26
Chapter 27
Chapter 28
Chapter 29
Chapter 30
Chapter 31
Week Three
Chapter 32
Chapter 33
Chapter 34
Chapter 35
Chapter 36
Chapter 37
Chapter 38
Chapter 39
Chapter 40
Chapter 41
Chapter 42
Chapter 43
Week Four
Chapter 44
Chapter 45
Chapter 46
Chapter 47
Chapter 48
Chapter 49
Chapter 50
Chapter 51
Chapter 52
Chapter 53
Chapter 54
Chapter 55
Chapter 56
Chapter 57
Chapter 58
Chapter 59
Chapter 60
Chapter 61
Chapter 62
Chapter 63
Chapter 64
Chapter 65
Chapter 66
Chapter 67
Zero Day
Chapter 68
Memorandum
Acknowledgments
Copyright
MEMORANDUM
NS rated 10
DATE:
April 14
FROM:
John S. Springman
Deputy NSA, The White House
TO:
Roger Witherspoon
Executive Assistant Director, DHS
RE:
Interim Report
Following the catastrophic events late last year, Congress and the President directed the creation of a confidential Committee of Inquiry. Attached is the Interim Report of the Committee. It strikes me as a bit purple in places and speculative in others, but I accept that this is an accurate and fair rendering of the events last year. The IR has been disseminated to all involved agencies. Should there be areas you wish expanded, be certain to convey that desire to me within 10 days. Should you desire redaction of any portion, I am instructed to advise that such a request must be made in writing within the same time period, and state with specificity those