Leverage digital technologies to achieve competitive advantage through market-leading processes, products and services, customer relationships, and innovation How does Information Technology enable competitive advantage? Digital Disciplines details four strategies that exploit today's digital technologies to create unparalleled customer value. Using non-technical language, this book describes the blueprints that any company, large or small, can use to gain or retain market leadership, based on insights derived from examining modern digital giants such as Amazon, Netflix, and Uber, established firms such as Burberry, GE, Nike, and Procter & Gamble, and lesser-known innovators such as Alvio, Fruition Sciences, Opower, and Quirky. Companies can develop a competitive edge through four digital disciplines information excellence, solution leadership, collective intimacy, and accelerated innovation that exploit cloud computing, big data and analytics, mobile and wireline networks, social media, and the Internet of Things. These four disciplines extend and update the value disciplines of operational excellence, product leadership, and customer intimacy originally defined by Michael Treacy and Fred Wiersema in their bestselling business classic The Discipline of Market Leaders. * Operational excellence must now be complemented by information excellence leveraging automation, information, analytics, and sophisticated algorithms to make processes faster, better, and more cost-effective, seamlessly fuse digital and physical worlds, and generate new revenue through techniques such as exhaust data monetization * Product leadership must be extended to solution leadership smart digital products and services ranging from wind turbines and wearables to connected healthcare, linked to each other, cloud services, social networks, and partner ecosystems, focused on customer outcomes and creating experiences and transformations * Customer intimacy is evolving to collective intimacy as face-to-face relationships not only go online, but are collectively analyzed to provide individually targeted recommendations and personalized services ranging from books and movies to patient-specific therapies * Traditional innovation is no longer enough accelerated innovation goes beyond open innovation to exploit crowdsourcing, idea markets, innovation networks, challenges, and contest economics to dramatically improve processes, products, and relationships This book provides a strategy framework, empirical data, case studies, deep insights, and pragmatic steps for any enterprise to follow and attain market leadership in today's digital era. It addresses improved execution through techniques such as gamification, and pitfalls to beware, including cybersecurity, privacy, and unintended consequences. Digital Disciplines can be exploited by existing firms or start-ups to disrupt established ways of doing business through innovative, digitally enabled value propositions to win in competitive markets in today's digital era.
Wireless LANs can be found nearly everywhere today. Most mobile computers ship with built-in wireless LAN hardware by default and most other computers can be equipped with additional hardware. Because all data is transmitted wirelessly, extra security is needed in these networks. This was a concern to the creators of the IEEE 802.11 standard, who designed a simple protocol called WEP which stands for Wired Equivalent Privacy to protect such networks. Unfortunately, the WEP protocol has some serious design flaws and various attacks are possible against WEP protected networks. This book presents nearly all currently known attacks on the WEP protocol, including their theoretical background and their implementation. This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks.
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.
- Learn how “inside out” techniques can poke holes into protected networks
- Understand the new wave of “blended threats” that take advantage of multiple application vulnerabilities to steal corporate data
- Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
- Prevent attacks against the mobile workforce and their devices containing valuable data
- Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
- Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
The security in MANET has become a significant and active topic within the research community. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. This thesis addresses the aforementioned gap by providing a proper definition and categorization of collaborative attacks against MANET from the various multiple node attacks found. Simulation using OPNET Modeler was used to investigate the performance impact of a collaborative blackhole attack on a mobile ad hoc network. Network throughput, packet delivery ratio and end-to-end delay are the performance metrics used in our result analysis. Based on the analyses of performance metrics made, we realised the consequences of a collaborative blackhole attack on MANET. In order to prevent or reduce these consequences, we also discuss a number of mitigation plans to counteract the different kinds of collaborative attacks.