
The Digital Big Bang
The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges
Humankind's efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic 'Big Bang' as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges.
This innovative text adopts a scientific approach to cybersecurity, identifying the science's fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world's leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book:
- Guides readers on both fundamental tactics and advanced strategies
- Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues
- Helps readers work with the central elements of cybersecurity, rather than fight or ignore them
- Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others
- Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell
The Digital Big Bang is an invaluable source of information for anyone faced with the challenges of 21 st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
SECTION 1
BINDING STRATEGIES:THE CORE OF CYBERSECURITY

THE NEED FOR SPEED
THE DRIVE TO CONNECT
HARNESSING SPEED AND CONNECTIVITY
- Blast and heat whole cities—Generate cool air in the summer and heated air in the winter via clean electricity from nuclear power plants
- Heat and blast whole cities—Generate fire and concussion via a nuclear weapon
1
SPEED
“Speed is at the nucleus of the cyberfrontier.”Roland Cloutier,
ADP

“Greater connectivity, faster transmission and processing speeds, and machine algorithms result in faster and potentially more accurate decisions.”Scott Charney,
Microsoft
- Raw speed to detect and mitigate attacks in real time
- Processing capacity with more sensors, more data, and more insights to parse data more efficiently and find the smallest anomalies in system functionality
- Forward compatibility to create the headroom to implement future solutions that could involve even greater speed
SPEED: THE NUCLEUS OF THE CYBERFRONTIER
WHAT DO WE MEAN BY SPEED?
HOW SPEED IMPACTS SECURITY
Table of contents
- Cover
- Table of Contents
- ABOUT THE AUTHOR
- CONTRIBUTORS
- ACKNOWLEDGMENTS
- INTRODUCTION
- SECTION 1: BINDING STRATEGIES:THE CORE OF CYBERSECURITY
- SECTION 2: ELEMENTARY SHORTFALLS:THE THINGS WE DIDN'T GET RIGHT AT THE BEGINNING
- SECTION 3: FUNDAMENTAL STRATEGIES:PROVEN STRATEGIES THAT DON'T LET US DOWN
- SECTION 4: ADVANCED STRATEGIES:SOPHISTICATED CYBERSECURITY OPERATIONS
- SECTION 5: HIGHER-ORDER DIMENSIONS:WHERE HUMAN FACTORS CAN ECLIPSE COMPUTING WIZARDRY
- THE FUTURE
- INDEX
- End User License Agreement