The Fifth Domain: A Solid Modern History for 2021

The Fifth Domain: A Solid Modern History for 2021

y fSummary

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knacke is a follow up to their 2010 novel Cyber War: The Next Threat to National Security and What to Do about It.

This novel discusses the history, workings, and risks of cybersecurity related technologies and problems faced in 2019, many of which are still in the fore-front in 2021. Each chapter covers a cybersecurity event, policy, or technology generally painting a history starting with the Petya randsomware attack of late 2016 and ending in quantum computing announcements of late 2019. The perspective is from government cyber security policy makers with a technical background.

Topics discussed are:

  • Petya, NotPetya, StuxNet, and Wannacry attacks
  • Cloud Computing / AWS GovCloud
  • Spectre/Meltdown and Venom attacks
  • Separation of internet and state
  • Hack back
  • Efficacy of US cyber regulations in both private and public sectors
  • AI and machine learning
  • Quantum computing
  • 5G / IoT
  • ICS / SCADA
  • Personal cyber security

My Reaction

This novel is a great problems facing modern (as of 2021) cybersecurity professionals. It does a good job of briefly describing recent attacks & emerging concerns while also explaining why these events were so important. I personally struggled through the beginning chapters because it was a rehash of content covered in many other novels, but I did gather some insights.

This novel is laid out very well and doesn’t fall victim to many of the issues of other cybersecurity novels. It gives a “so what” about events, makes recommendations about what can be done to fix problems, and doesn’t ignore the wide breadth of concerns cybersecurity professionals current have to contend with. It uses language that is slightly more technical that most but feels approachable for non-technical readers.

I found the insights about how organizations need dozens of security software suites but no company is making a useful all-in-one suite very topical and is a personal frustration. I was hoping the authors would suggest a solution to this, but they did not.

The authors are very wary about letting government having a role in cybersecurity for private organizations. They outline the dangers of a government run cyber defense screen, encryption backdoors, and “clipper chips” very well. However, the authors also paint a picture that cyber defenders are starting to gain an advantage over attackers which I personally disagree with. It is true that networks who properly implement a full system security plan are much safer than they use to be, attackers continue to develop novel attacks, social engineering methods, and zero-days that get around even the best plan.

Recommendation

I recommend this book as essential reading for all information technology professionals and hobbyists. If you only want to read one book on cybersecurity, this might be the right one to choose. I especially recommend that cyber policy makers read this to understand current and emerging threats as well as solid recommendations for defending against them.

[dsm_block_reveal_text block_reveal_text=”Recommended Reading for:” block_reveal_delay=”0.5″ _builder_version=”4.8.1″ _module_preset=”default”][/dsm_block_reveal_text][dsm_star_rating title=”IT Curious Readers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”All IT Professionals” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”4″ title=”Help Desk Technicians” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”System Administrators” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”4″ title=”Network Administrators” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”4″ title=”Software Developers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”Security Analysts” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”Security Engineers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”4″ title=”Penetration Testers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”CISOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”CIOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating title=”CTOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”4″ title=”CEOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating]
[dsm_star_rating title=”My Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.2″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating]
[dsm_star_rating title=”Amazon Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center”][/dsm_star_rating]
[dsm_star_rating rating=”4″ title=”GoodReads Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center”][/dsm_star_rating]
The Plot to Hack America: the 2016 Elections

The Plot to Hack America: the 2016 Elections

Synopsis (heavy bias)

Going into the 2020 elections, I thought it would be good to get some insights on how Russian cyber efforts affected the 2016 elections. The Plot to Hack America: How Putin’s Cyberspies and WikiLeaks Tried to Steal the 2016 Election seemed liked it could wrap things up neatly. It did not.

The majority of this novel is focused on the history of Russian spycraft. There are a few sparse paragraphs that discuss how common Russian spycraft methods were applied to the hack of the Democratic National Convention emails, how they use Donald Trump as an unwitting asset, and what role WikiLeaks had on the elections. However it is mostly trying to draw correlation between what Russia is known to do and how people acted going into the elections.

My Reaction

This novel does not talk about the technical methods of getting into the DNC’s emails. It does not address the use of social media to promote their ideology. It does not talk about events were used to manipulate the media. It does not talk about any real cyber security topics.

Overall, this novel does not address its title. It reads as a rant against WikiLeaks and as a means to vilify Russia. Maybe those organizations are horrible, but this book does a poor job of proving it.

Recommendation

I do not recommend this novel for anyone. The only lesson for a cyber security professional in this book is to make sure you consider your software as a service offerings in your security plans. Don’t assume that Google, Microsoft, or any other SaaS provider is doing all the security for you.

[dsm_block_reveal_text block_reveal_text=”Recommended Reading for:” block_reveal_delay=”0.5″ _builder_version=”4.8.1″ _module_preset=”default”][/dsm_block_reveal_text][dsm_star_rating rating=”1″ title=”IT Curious Readers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”All IT Professionals” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”Help Desk Technicians” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”System Administrators” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”Network Administrators” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”Software Developers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”Security Analysts” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”Security Engineers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”Penetration Testers” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”CISOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”CIOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”CTOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating][dsm_star_rating rating=”1″ title=”CEOs” stars_size=”22px” stars_gap=”-2px” stars_color=”#CC7700″ show_number=”on” _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#D6D6D6″ rating_number_text_color=”#CC7700″ rating_number_font_size=”13px” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating]
[dsm_star_rating rating=”1″ title=”My Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center” hover_enabled=”0″ sticky_enabled=”0″][/dsm_star_rating]
[dsm_star_rating title=”Amazon Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center”][/dsm_star_rating]
[dsm_star_rating rating=”4″ title=”GoodReads Rating” stars_display_type=”block” stars_size=”30px” stars_color=”#CC7700″ _builder_version=”4.8.1″ _module_preset=”default” header_text_color=”#FFFFFF” header_font_size=”26px” text_orientation=”center”][/dsm_star_rating]