{"id":1278,"date":"2022-03-16T22:33:00","date_gmt":"2022-03-16T21:33:00","guid":{"rendered":"http:\/\/www.klaushaller.net\/?p=1278"},"modified":"2022-03-27T06:35:11","modified_gmt":"2022-03-27T05:35:11","slug":"book-summary-ben-buchanan-the-hacker-and-the-state","status":"publish","type":"post","link":"https:\/\/www.klaushaller.net\/?p=1278","title":{"rendered":"Book Summary &#8211; Ben Buchanan: The Hacker and the State"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/03\/IMG_20220313_141913-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"469\" src=\"http:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/03\/IMG_20220313_141913-1.jpg\" alt=\"\" class=\"wp-image-1279\" srcset=\"https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/03\/IMG_20220313_141913-1.jpg 960w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/03\/IMG_20220313_141913-1-300x147.jpg 300w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/03\/IMG_20220313_141913-1-768x375.jpg 768w, https:\/\/www.klaushaller.net\/wp-content\/uploads\/2022\/03\/IMG_20220313_141913-1-624x305.jpg 624w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<p>Over the holiday, I took my time to read this book about state-sponsored attacks. Quite interesting if you want to model potential attacks on your company and organization. My summary in three parts distilled my learnings from reading the book.<\/p>\n\n\n\n<p>Part 1: <a href=\"https:\/\/www.linkedin.com\/pulse\/summary-ben-buchanans-hacker-state-part-3-klaus-haller?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_recent_activity_details_shares%3Bv5peZD%2FOQseHhjTa4J8VOQ%3D%3D\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/pulse\/summary-ben-buchanans-hacker-state-part-3-klaus-haller?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_recent_activity_details_shares%3Bv5peZD%2FOQseHhjTa4J8VOQ%3D%3D\" target=\"_blank\" rel=\"noreferrer noopener\">Espionage<\/a><\/p>\n\n\n\n<p>Part 2: <a href=\"https:\/\/www.linkedin.com\/pulse\/summary-hacker-state-part-2-attack-klaus-haller\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/pulse\/summary-hacker-state-part-2-attack-klaus-haller\/\" target=\"_blank\" rel=\"noreferrer noopener\">Attack<\/a><\/p>\n\n\n\n<p>Part 3: <a href=\"https:\/\/www.linkedin.com\/pulse\/summary-ben-buchanans-hacker-state-part-3-klaus-haller\/\" data-type=\"URL\" data-id=\"https:\/\/www.linkedin.com\/pulse\/summary-ben-buchanans-hacker-state-part-3-klaus-haller\/\" target=\"_blank\" rel=\"noreferrer noopener\">Destabilization<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the holiday, I took my time to read this book about state-sponsored attacks. Quite interesting if you want to model potential attacks on your company and organization. My summary in three parts distilled my learnings from reading the book. Part 1: Espionage Part 2: Attack Part 3: Destabilization<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,15,23,1],"tags":[33,35,32,34],"class_list":["post-1278","post","type-post","status-publish","format-standard","hentry","category-information-security","category-it-risk","category-securityarchitecture","category-uncategorized","tag-atp","tag-book-summary","tag-hacking","tag-state-sponsored-hackers"],"_links":{"self":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts\/1278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1278"}],"version-history":[{"count":1,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts\/1278\/revisions"}],"predecessor-version":[{"id":1280,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=\/wp\/v2\/posts\/1278\/revisions\/1280"}],"wp:attachment":[{"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klaushaller.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}