+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Taming the Hacking Storm. A Framework for Defeating Hackers and Malware. Edition No. 1

  • Book

  • 336 Pages
  • April 2025
  • John Wiley and Sons Ltd
  • ID: 6042045
A transformative new approach to Internet security from an experienced industry expert

Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, author and cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat - one that rests on a foundation of identity verification - and explains exactly how to implement it in the real world.

The author addresses each of the challenges, pitfalls, and roadblocks that might stand in the way of his solutions, offering practical ways to navigate, avoid, or counter those impediments. The book also includes: - How to address peripheral security issues, including software and firmware vulnerabilities - Strategies for addressing a lack of international agreement on the implementation of security standards and practices - Things you can do today to encourage the development of a more secure, trusted Internet

An insightful and original new approach to cybersecurity that promises to transform the way we all use the Internet, Taming the Hacking Storm is a must-read guide for cybersecurity practitioners, academic researchers studying Internet security, and members of the general public with an interest in tech, security, and privacy.

Table of Contents

Table of Contents

 

About the Author

Preface

About This Book

Acknowledgments

Chapter Summaries

Part I: Identifying the Problem

Chapter 1: How Bad Is Internet Security?

Chapter 2: How We Are Attacked and Why

Chapter 3: The Problem

Chapter 4: Challenges

Part II: The Technology Solution

Chapter 5: The Solution

Chapter 6: Technology Solution Summary

Chapter 7: Trusted Identity

Chapter 8: Safe and Trusted Devices

Chapter 9: Trusted OS and Apps

Chapter 10: Trusted Networks

Chapter 11: Trust Assurance Service

Chapter 12: Internet Security Global Alliance

Part III: Challenging the Solution

Chapter 13: Threat Modeling

Chapter 14: Common Questions

Part IV: Other Needed Solutions

Chapter 15: Secure Coding

Chapter 16: Better Patching

Chapter 17: Getting International Agreements

Chapter 18: What You Can Do

Index

Authors

Roger A. Grimes