7

Government Access to Data

In previous chapters of this book, we discussed several types of threats in detail, including the exploitation of vulnerabilities, different categories of malware, ransomware (targeted attacks with extortion), and internet-based threats like phishing, drive-by download attacks, and DDoS attacks. In this chapter we’ll explore another potential threat that concerns many CISOs and security teams – governments. Note that I’ll be discussing legal concepts and mechanisms, regulations, and laws in this chapter. I’m not an attorney and I’m not offering legal advice. I recommend that you consult a qualified attorney for advice on the topics you read in this chapter. Additionally, what is written in this chapter and in the ...

Get Cybersecurity Threats, Malware Trends, and Strategies - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.