Join our book community on Discord
In the previous of chapters of this book, we discussed several types of threats in detail including vulnerabilities, different categories of malware, ransomware (targeted attacks with extortion), and internet-based threats like phishing, drive-by download attacks, and DDoS attacks. In this chapter we’ll explore another potential threat that concerns many CISOs and security teams – governments. Note that I’ll be discussing legal concepts and mechanisms, regulations, and laws in this chapter. I’m not an attorney and I’m not offering legal advice. I recommend that you consult a qualified attorney for advice on the topics you read in this chapter. Additionally, what is written in this chapter and in the entire book are my own personal opinions and not those of my current employer or any former employers. With that said, let’s get started!
Things changed dramatically in June of 2013. At...