Professional Documents
Culture Documents
Cybersecurity 1St Edition Duane C Wilson Online Ebook Texxtbook Full Chapter PDF
Cybersecurity 1St Edition Duane C Wilson Online Ebook Texxtbook Full Chapter PDF
Wilson
Visit to download the full and correct content document:
https://ebookmeta.com/product/cybersecurity-1st-edition-duane-c-wilson/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://ebookmeta.com/product/cybersecurity-1st-edition-duane-c-
wilson/
https://ebookmeta.com/product/rockwell-s-lady-1st-edition-a-c-
wilson/
https://ebookmeta.com/product/supercharge-invasion-and-mudcake-
growth-in-downhole-applications-1st-edition-wilson-c-chin/
https://ebookmeta.com/product/cybersecurity-and-third-party-risk-
third-party-threat-hunting-1st-edition-gregory-c-rasner/
Thomas Calculus Solutions Manual 14th Edition Duane
Kouba
https://ebookmeta.com/product/thomas-calculus-solutions-
manual-14th-edition-duane-kouba/
https://ebookmeta.com/product/maritime-cybersecurity-a-guide-for-
leaders-and-managers-2nd-edition-gary-c-kessler/
https://ebookmeta.com/product/care-climate-and-debt-
transdisciplinary-problems-and-possibilities-1st-edition-
benjamin-c-wilson-editor/
https://ebookmeta.com/product/wilson-carter-the-new-neighbor-1st-
edition-wilson/
https://ebookmeta.com/product/historical-dictionary-of-inter-
american-organizations-second-edition-david-w-dent-larman-c-
wilson/
CYBERSECURITY
The MIT Press Essential Knowledge series
A complete list of the titles in this series appears at the back of this book.
CYBERSECURITY
DUANE C. WILSON
All rights reserved. No part of this book may be reproduced in any form
by any electronic or mechanical means (including photocopying, recording,
or information storage and retrieval) without permission in writing from
the publisher.
The MIT Press would like to thank the anonymous peer reviewers who
provided comments on drafts of this book. The generous work of academic
experts is essential for establishing the authority and quality of our
publications. We acknowledge with gratitude the contributions of these
otherwise uncredited readers.
This book was set in Chaparral Pro by New Best-set Typesetters Ltd.
10 9 8 7 6 5 4 3 2 1
CONTENTS
1 Cybersecurity Origins 1
2 Foundations 9
3 Cryptography Demystified 31
4 Cybersecurity in Layers 47
5 Who Attacked Me? 67
6 Malware in Action 83
7 Modern-Day Applications 99
8 Cybersecurity for the Future 115
Glossary 129
Notes 137
Further Reading 141
Index 143
SERIES FOREWORD
CYBERSECURITY ORIGINS
2 chapter 1
Figure 1 Enigma machine and components.
Cybersecurity Origins 3
Cipher machines allowed military personnel to encrypt
and decrypt communications. That process is called confi-
dentiality, one of six fundamental goals of cybersecurity.
(All six are formally introduced in chapter 2.) These days,
cybersecurity technologies are much more complex and
sophisticated than cipher machines. But it is essential
that we understand the basic vulnerabilities of electronic
communications.
As computer technologies became more sophisti-
cated and interconnected, they became more susceptible
to more pernicious—and malicious—forms of attacks.
Malicious software, or malware, emerged as the first class
of threats to computer and networked systems. Some of
the more commonly known types of malware are viruses,
worms, ransomware, spyware, adware, Trojans, and
bots. (For an overview of malware, see chapter 6.) The
earliest-known cases of malware were viruses and worms.
A computer virus infects another computer program and
spreads whenever that program is used. A computer worm
is a stand-alone program that exploits a vulnerability in a
computer system, and spreads itself through vulnerabili-
ties or by tricking the user into executing (or running) it.
The Creeper virus (or technically, the Creeper worm)
was created in 1971 by Robert (Bob) H. Thomas, a re-
searcher at BBN Technologies in Cambridge, Massachu-
setts. (BBN designed the first generation of gateways,
or routers, for the Advanced Research Projects Agency
4 chapter 1
Network [ARPANET], the precursor to the modern in-
ternet.) Creeper was an experimental self- duplicating
program that was designed to demonstrate mobile trans-
mittal of computer applications. It moved between com-
puters connected to the ARPANET (the first version of the
internet) and using BBN’s TENEX operating system (OS),
infected both computers and printers, displaying the mes-
sage “I’M THE CREEPER: CATCH ME IF YOU CAN.”2
In 1982, Richard Skrenta, a curious fifteen year old,
wrote the code for Elk Cloner, the first computer virus
known to be spread “in the wild,” meaning outside a closed
network or research environment. The virus was installed
on floppy diskettes that stored the Apple II OS. When
a computer was booted from an infected disk, the virus
would copy itself to any uninfected floppy disk it could
access—at that time, most computers had dual disk drives,
and OS disks were often used to boot up multiple comput-
ers. On every fiftieth infected computer, the virus would
display the following text (shown here in the groovy style
of the 1980s):
Cybersecurity Origins 5
It will stick to you like glue
6 chapter 1
of its inherent vulnerabilities? To answer these questions,
we must briefly understand one of its core features—
packet switching. In 1961, MIT PhD computer science
student Leonard Kleinrock published a theoretical paper
on packet switching, an alternative method to purely elec-
tronic signals for sharing data between connected com-
puter systems. A packet consists of a header and payload;
the header tells the network’s hardware where and how
to deliver the payload, the contents of the message. The
concept was later adopted in the early plans for ARPANET
by MIT-trained electrical engineer Lawrence (Larry) G.
Roberts, who was then working for the Defense Advanced
Research Projects Agency.
Kleinrock would later obtain a professorship at the
University of California in Los Angeles; his lab was se-
lected as the first node for the nascent ARPANET. As more
computers were added to ARPANET, computer scientists
focused on software to govern the shuttling of data across
the network. An early example is the host-to-host proto-
col, which outlined the rules by which information is ex-
changed: the message (or packet) format, delivery time,
file type, and other such variables. Today, consumers as-
sume that their internet-connected devices have built-in
cybersecurity measures, however that was not a concern
for the internet pioneers. Somehow they did not antici-
pate the diversity and intensity of the cyberattacks that
now plague the internet.
Cybersecurity Origins 7
The Morris worm attack could have been prevented.
Estimates are that it shut down roughly 10 percent of
all the computers connected to the internet at the time;
that’s essentially a cyberpandemic! That worm prolifer-
ated largely because the early internet had a flat structure
rather than a hierarchical one. Today, the internet is essen-
tially made up of public and private networks separated by
firewalls—cybersecurity protocols that monitor and con-
trol the flow of traffic into and out of private networks (i.e.,
an organization’s local network). A simple firewall would
have stopped the Morris worm in its tracks. The inter-
net is now more secure, but it is also more threatened. In
the subsequent chapters, I will explore both the threats
and modern cyberdefenses. Additionally, I will show how
cybersecurity is practically implemented on the internet,
and discuss how the field is likely to change with new and
forthcoming technologies, such as blockchain technology
or quantum cryptography.
8 chapter 1
2
FOUNDATIONS
10 chapter 2
that there are six goals of cybersecurity. In fact, there are
three industry-recognized major goals (1–3), and three
others (4–6) that are often neglected.
Foundations 11
the use of encryption. Described further in the next chap-
ter, encryption is a fundamental part of cryptography that
allows for data to be translated into a form that is illegible
to those without authorized access. Encryption requires a
secret key that is known only to the parties that possess
it. Decryption is the opposite of encryption and is known
as the process of converting the encrypted data back to its
original form. In the digital world, encryption and decryp-
tion are accomplished at varying levels of sophistication,
but at a high level, they are essentially the same as using a
key to lock and unlock our house or car.
There are two forms of encryption: symmetric and
asymmetric. Symmetric encryption uses the same key
to both encrypt and decrypt data. Asymmetric encryp-
tion uses a key that is publicly available to encrypt (pub-
lic key) and a key that is kept private to decrypt (private
key). Symmetric key encryption is much faster than asym-
metric key encryption, so it is the preferred choice for
encrypting or decrypting data. The asymmetric key can
be used to encrypt the symmetric key to protect it from
being stolen. The combination of symmetric and asym-
metric key encryption is effective for protecting a variety
of online transactions. Indeed, it forms the basis for the
blockchain and other technologies that have given rise to
cryptocurrencies.
The standard technology for keeping an internet con-
nection secure while safeguarding sensitive data being
12 chapter 2
In the cyber world,
people’s information
is kept confidential
through the use of
encryption.
sent between the client and web server is the Secure Sock-
ets Layer (SSL). Someone who purchases a domain name
is typically given the option of purchasing an SSL certifi-
cate, which works like a digital wallet containing infor-
mation that identifies its owner and the metadata about
that owner. An SSL certificate prevents criminals from
reading and modifying any information being transferred
between websites, including potential personal details.
When a website is secured by an SSL certificate, the web-
site address, or URL, will show up as a Hypertext Trans-
fer Protocol Secure (HTTPS), and not just HTTP. A recent
update to the SSL is Transport Layer Security (TLS), which
allows users to view the details of the certificate, including
the issuing authority and corporate name of the website
owner.
Both SSL and TLS enable us to talk to other users or
computer systems online in a secure manner –through
the establishment of a secure communications channel.
They are generally used interchangeably, and you will often
see them denoted as SSL/TLS in writing. SSL/TLS uses
both asymmetric and symmetric key encryption to accom-
plish the goal of secure data transmission. At a high level,
the steps used behind the scenes for SSL/TLS are those
depicted in figure 2. In summary, a client (a networked
computer) and the server (the host of resources that the
client needs to access) contact one another, the SSL/TLS
certificate is presented, the client authenticates it, they
14 chapter 2
Figure 2 SSL/TLS encrypted session establishment.
Foundations 15
exchange a list of supported cipher suites and agree on
one, and then key exchange occurs.3
Blockchain Security
16 chapter 2
from roughly $1 million in 2012 to more than $1 billion in
2017. In 2018, the blockchain protocol known as EOSIO
generated a massive $4.2 billion of investment in the “ini-
tial coin offering” for its EOS cryptocurrency.5
Integrity
Foundations 17
the identity of the users authorized to access a system,
and verifying that the system has not been compromised
since the last log-in. The first principle requires the use
of some form of biometric data. Most modern machines
now have some form of biometric authentication avail-
able, such as an iris scan, fingerprint reader, or voice rec-
ognition that works in combination with text-based log-in
credentials, like a username and password. The second
principle is usually accomplished by an OS function called
secure boot. Imagine that before you can enter your car or
house, there is a scan to determine whether or not it has
been broken into. This is akin to what a secure boot does
for a computer system. If the scan results in any errors (i.e.,
something has changed since the last log-in), the system
will shut down and refuse to boot until it is analyzed for
compromise. The combination of these two principles—
biometric authentication and secure boot—provides sys-
tem integrity.
Data integrity is the successor to system integrity.
Why? In the analogy I used above regarding the house,
once you have verified that (in general) things have not
been tampered with, then you want to verify the con-
tents one by one, especially the most critical ones. In
computing, data comes in many different formats, sizes,
and access levels (e.g., classified information). Both data
and system integrity verification require some form of
hashing. As mentioned above, hashing is a cryptographic
18 chapter 2
transformation that produces an irreversible representa-
tion of the item that was hashed. In other words, data is
transformed using a cryptographic key and function that
results in a string of characters that represents that file,
application, password, or system contents. This same
operation can be performed before the file, application,
password, or system contents are accessed. This verifies
that the integrity of the item has not changed since its last
known “trusted” state. Referring back to the house anal-
ogy, let’s say you notice that your safe has been tampered
with; you may still have an integrity issue regardless of the
results of the “house scan” for system integrity.
Three of the top examples of integrity principles being
used today are passwords, application verification, and
tripwire. Passwords are still the most widely used form
of authentication in conjunction with some form of a
username. To maintain their integrity and confidential-
ity, passwords are not stored in their native form. Once
you create a password, it will be hashed, salted, and then
stored. Adding the salt to hashing provides another level
of security for password integrity. A salt is essentially a
one-time random stream of characters that is changed
every time the password is updated. The application auto-
matically updates the salt, without requiring interaction
by the user or system owner. The best modern-day exam-
ple of a salt is the completely automated public Turing test
to tell computers and humans apart (captcha). Each time
Foundations 19
you navigate to a website and attempt to log in, a differ-
ent captcha code is presented, which serves as part of the
authentication process.
In the event that an application may have been tam-
pered with, application verification can be initiated, which
is typically done when an application (like a hash) is cre-
ated and downloaded (e.g., the same hash is computed or
verified). If the hash verification process fails, the user
should not trust the application.
Lastly, tripwire is an application used primarily for file
integrity. By now you can see the pattern for integrity, and
tripwire follows suit. Once installed, it will create hashes
of all the files you select and update these hashes when-
ever an authorized user updates the files. On accessing the
files that have been integrity protected, tripwire will send
an alert if a file has been modified by an unauthorized user.
Availability
20 chapter 2
Otherwise the retailer is likely to lose sales. Key metrics
related to availability are uptime and downtime, which
reflect the percentage of time a system could potentially
be up or down, respectively, during a given period. Table 1
shows the mapping between percentages and actual time
periods. As you can see, even the smallest percent-
age change results in a lot more downtime across years,
months, weeks, and days.6
Availability affects many aspects of our online interac-
tions. Many organizations are now using cloud computing
(accessing remote data centers for resources, data storage,
and computing power) to enable digital transformation
(how digital information is used or transformed). Accord-
ing to the latest Gartner report, the cloud technologies
services market was projected to grow 17.3 percent ($206
billion) in 2019, up from $175.8 billion in 2018; by 2022,
90 percent of organizations will be using cloud services.7
90% (“one nine”) 36.50 days 72.0 hours 16.80 hours 2.4 hours
95% 18.25 days 36.0 hours 8.40 hours 1.2 hours
97% 10.96 days 21.6 hours 5.04 hours 43.2 minutes
98% 7.30 days 14.4 hours 3.36 hours 28.8 minutes
99% (“two nines”) 3.65 days 7.2 hours 1.68 hours 14.4 minutes
Foundations 21
Clouds are particularly important for e-commerce. Stud-
ies estimate that 1.92 billion global digital buyers existed
in 2019. Today, about 25 percent of the world’s popula-
tion of 7.7 billion people shop online.8 The ubiquity of the
cloud makes the goal of availability all that much more
important.
Availability is also critical to governments, and espe-
cially their departments of defense. When a business’s
cyber system fails or is interrupted, business operations
and revenue are negatively impacted. When a government-
run system goes down, lives can be lost. For example, the
US Department of Defense’s Advanced Field Artillery Tac-
tical Data System is used by the army and marine corps
to provide automated support during conflicts.9 When a
“request-for-fire” command is made to this system, a num-
ber of components and subsystems need to be available at
that precise moment in order to achieve a precision strike.
Any interruption to such a system could be catastrophic.
There are three goals that are typically left out of primary
cybersecurity definitions: authentication, authorization,
and nonrepudiation. Although confidentiality, integrity,
and availability are the foundations on which the entire
22 chapter 2
field is built, if you cannot verify online identity (authen-
tication), determine what users have access to (authoriza-
tion), and prevent users from denying that things have
occurred (nonrepudiation), you are only solving a portion
of the cybersecurity problem.
Authentication
In its simplest form, authentication is usually accom-
plished by a username and password selected by the user.
It is safe to assume that most individuals have had to use
some form of authentication online. Its purpose is to ver-
ify that a user is who they say they are. Multifactor authen-
tication (MFA) is typically required to access a resource.
One of the first steps of access control is the identification
and authentication of users. There are three common fac-
tors used for authentication:
Foundations 23
Authorization
Authorization works in conjunction with authentication;
it takes place after an individual has been authenticated
to a system. Authorization then is responsible for deter-
mining the scope of access to a resource that a particu-
lar person has once authenticated. What is a resource? A
resource can be anything in a computing environment.
The most common resources are files (like a word proc-
essing document) or applications (like a word processing
software or internet browser). All files in any variant of
an OS—Microsoft’s Windows, Red Hat’s Linux, or Apple’s
iOS—can be assigned permissions. File permissions facili-
tate the authorization’s scope and type. See figure 3 for the
Linux OS’s permissions structure.
Applications contain similar permissions structures,
but let us take a closer look at how permissions work. As
you can see, there are four general permissions sections:
file type, file owner permissions, group owner permissions, and
other user permissions. The file type section is simple, ask-
ing: Are these permissions applicable to a file or directory
(which hosts multiple files)? The file owner is the authen-
ticated user. This section denotes whether or not a user
can read (r) the file only, or both read and write (w) to the
file (i.e., edit the file). The (x) is specifically for applications
that can be executed or run. These same permissions apply
for people in the same group. For a particular organization,
you can have all administrative assistants or engineers in
24 chapter 2
Figure 3 Linux permissions structure.
Foundations 25
techniques in their approach to traffic control. Firewall
ACLs are called rules. For instance, most companies pre-
vent access to certain sites (e.g., pornography sites) from
an internal computer. One or more rules that disallow
a web browser from navigating to that type of website
accomplishes this block. An IPS is usually deployed to pre-
vent malicious traffic from coming into a network. An easy
illustration to understand is an email that has an attach-
ment with some form of malware in it. XYZ has designed
an IPS to detect this type of traffic, and then block the
attachment or prevent the email from reaching the recipi-
ent’s in-box.
Nonrepudiation
The last goal of cybersecurity—nonrepudiation—is typi-
cally handled using a digital signature or something simi-
lar. It prevents someone from being able to claim that they
did not send a message or authorize some other action,
when they actually did. It is most commonly used in email,
however it has its origins off-line in the postal service.
Postal services offer the mail service of registered mail in
many countries. Registered mail provides the sender proof
of mailing via a mailing receipt, and on request, electronic
verification that the mail service delivered an article or
attempted to make a delivery. In this case, nonrepudia-
tion is focused on the recipient—not the sender—but the
same principles apply. A second, nontechnical example is
26 chapter 2
a notary public—someone authorized by the government
to serve the public as an impartial witness in performing a
variety of official fraud-deterrent acts related to the sign-
ing of important documents. A notary’s duty is to screen
the signers of important documents for their true identity,
to sign without duress or intimidation, and to be aware of
the contents of the document or transaction.
In the digital world, nonrepudiation plays a role in
email origin verification, financial transactions, and audit
records. For email, since malware is often transmitted
through attachments, nonrepudiation gives the sender
some form of proof that the origin of the message is
legitimate and can be trusted. This is accomplished using
a digital signature. If you recall, earlier I discussed asym-
metric key cryptography. In this form of cryptography,
there is a public and private key. I will explore this in fur-
ther detail in chapter 3, but here it is helpful to note that
the private key is used to produce a digital signature that
can be verified by the recipient of an email message. In
financial transactions, users are required to provide iden-
tifying information before making a purchase and each
transaction is associated with a unique ID. This is, in part,
to provide nonrepudiation to protect vendors from users
making false refund claims for products they have already
received. Lastly, financial websites maintain a detailed
record of each page visited including information such
as internet protocol (IP) addresses. Digital forensics can
Foundations 27
use this information to prove the authenticity of a user’s
actions.10
28 chapter 2
actual content. This allows attackers to eavesdrop on
communications, steal data directly from the services
and users and to impersonate services and users.
Foundations 29
to access a particular resource since they cannot be veri-
fied. Due to the Heartbleed attack, a number of websites
were taken down to be updated, resulting in widespread
downtime across the web. Even though this downtime was
temporary, it still affected the availability of a large per-
centage of websites online. As I have shown through the
Heartbleed attack, a single attack can adversely affect any
and all of the cybersecurity tenets. As a result, it is impor-
tant to have a good understanding of how to preserve
these tenets.
30 chapter 2
3
CRYPTOGRAPHY DEMYSTIFIED
Cryptography as an Equation
and
32 chapter 3
For equation (1), some form of plaintext is translated
by an encryption key to produce the ciphertext. For equa-
tion (2), some form of ciphertext is translated by a decryp-
tion key to produce the original plaintext. In the case of the
equations above, the same key is used for both encryption
and decryption. This is not always the case, as I will detail
further in this chapter. For now, let’s break down each
equation component. Plaintext is an input for an encryp-
tion algorithm, and can be in the form of text, audio, video,
and images. Ciphertext is generally described as the out-
put of the encryption process. Or to look at it another way,
plaintext is in a human-readable or legible format. To pre-
serve the confidentiality of the plaintext, the ciphertext
should not be human readable or legible. Here is a simple
illustration using a substitution cipher from the Practical
Cryptography website.1 Keys for the simple substitution
cipher usually consist of twenty-six letters. An example
key is:
Cryptography Demystified 33
To create ciphertext, each character of the plaintext
is replaced with the corresponding letter in the cipher
alphabet. The cipher alphabet is simply a mapping that
denotes how to go from the plaintext to ciphertext. The
simplest instance of this is abc —> xyz. Wherever you see
an a, replace it with an x; when you see a b, replace it with
a y; and when you see a c, replace it with a z. So “cab” would
be translated to “zxy.”
In cryptography, a substitution cipher is a method of
encrypting by which ciphertext replaces units of plain-
text. It is important to note that the simple substitution
cipher offers little communication security as it can be
easily broken, even by hand, especially as the messages
become longer (more than several hundred ciphertext
characters). An encryption key is typically a random string
of bits generated specifically to scramble and unscram-
ble data. Encryption keys are created with algorithms
designed to ensure that each key is unique and unpredict-
able. The longer the key that is constructed this way, the
harder it is to break the encryption code. It is important
to keep this premise in mind, as keys are foundational to
the field of cryptography and analogous to a physical key.
You can have the strongest fortress protected by dragons,
moats, guards, and other defense mechanisms, but if the
key (or mechanism) used to enter that fortress is com-
promised or stolen, all those defenses will become null
and void.
34 chapter 3
Confidentiality and Encryption
Cryptography Demystified 35
Another random document with
no related content on Scribd:
"On that point I am distressingly short of information. Lem's description
is rather vague. He describes it as being 'higher than anything at all, with
fire coming out of its eyes, long hair reaching to the ground, and dressed in
white.'"
During this conversation Sibyl had left the room "on hospitable
thoughts intent," and now returned to announce that supper was already
progressing rapidly—most welcome news to our hungry gentlemen.
Sibyl had taken off her hat, and now her raven curls fell in heavy tresses
to her waist. In the shadow, those glittering ringlets looked intensely black;
but where the firelight fell upon them, a sort of red light shone through.
As she moved through the high, shadowy rooms, with the graceful, airy
motion that lent a charm to the commonest action, Willard Drummond,
following her with his eyes, felt a secret sense of exultation, as he thought
this magnificent creature was his, and his alone. This bright, impassioned
sea-nymph; this beautiful, radiant daughter of a noble race; this royal,
though dowerless island-queen, loved him above all created beings. Had
she not told him as he whispered in her willing ear his passionate words of
love, that he was dearer to her than all the world besides? Some day he
would make her his wife, and take her with him to his princely home in
Virginia; and he thought, with new exultation, of the sensation this glorious
planet would make among the lesser stars of his native State.
He did not stop to think that he had loved with even more intensity once
before; that he had raved even in a like manner of another far less bright
than this queenly Sibyl. He did not stop to think that even so he might love
again.
No. Everything was forgotten but the intoxicating girl before him, with
her sparkling face, her glorious eyes of jet, and her flashing, sun-bright hair.
Guy had already taken his place, so Willard took the seat his young host
pointed out to him, and the business of the tea-table commenced.
When the meal was over, Aunt Moll cleared the table, and the three
gathered round the fire—for, though the weather was warm, the great
unaired room was chill enough to render the fire pleasant.
He waited for a response, but none came, only the echo of his own
voice sounded dolefully through the hall.
"Never mind, Guy," said Sibyl, laughing at his rueful face, "I'll go. Aunt
Moll and Lem are tired, doubtless, with their extraordinary exertions this
evening, and it would be a pity to wake them."
She quitted the room as she spoke, in the direction of the kitchen, in
search of lights.
And presently she reappeared, and announcing that Aunt Moll was
stretched out on her pallet, before the kitchen fire, asleep, she took her light,
and bidding them a smiling good-night, left them to seek her own room.
"Well, in spite of all the ghosts and hobgoblins that ever walked at 'noon
of night,' I shall sleep here as sound as a top until morning. Your ghost will
have to give me a pretty vigorous shaking before I awake, when once I
close my eyes."
Willard's first care was to lock the door securely, and then carefully
examine the room. There was no other means of ingress but the one by
which he had entered, and the room did not seem to communicate with any
other. The window was high above the ground, and firmly nailed down.
Clearly, then, if the ghost entered at all it must assume its ghostly
prerogative of coming through the keyhole—for there was no other means
by which ghost or mortal could get in.
Satisfied with this, Willard Drummond went to bed, but in spite of all
his efforts sleep would not come. Vain were all his attempts to woo the
drowsy god; he could only toss restlessly from side to side, with that feeling
of irritation which want of sleep produces.
The moonlight streaming in through the window filled the room with
silvery radiance. The silence of death reigned around, unbroken even by the
watch-dog's bark. The dull, heavy roar of the waves, breaking on the shore
like far-off thunder, was the only sound to be heard. And at last, with this
eerie, ghostly lullaby, Willard Drummond fell into a feverish sleep.
A wild laugh rang out on the air, and Sibyl was bending above him,
holding a glittering dagger to his heart, while her great black eyes burned
like two flames. He held out his hands for mercy, but she only mocked him
with her deriding black eyes, and raised the knife to plunge it into his heart.
He sprang out of bed and seized the door. It was locked as he had left it,
and, with his blood curdling, he stood rooted to the ground.
Morally and physically Willard Drummond was brave, but this midnight
visit from a supernatural being might have chilled the blood of the most
undaunted. Sleep now was out of the question; therefore, seating himself by
the window, he prepared to wait for the approach of morning. The moon
was already sinking behind the western horizon, bathing the placid river in
its soft beams. The morning star shone bright and serene in the cloudless
blue sky; and, gazing on the calm beauty without, the young man's pulse
ceased its feverish throbbings, and he began striving to account for this
ghostly visit by natural means.
But he strove in vain. The door was firmly locked, and there could be
no secret passage through those strong, oaken walls. Then he arose, and
carefully searched every crevice in the room that could by any possibility
be made a hiding-place of. Still in vain. The room contained no living thing
but himself.
Morning was now growing red in the east, and, exhausted with
watching, he threw himself on the bed, and fell into a deep dreamless sleep,
from which he did not awake until the sun was high in the heavens.
He sprang hastily out of bed, and proceeded to dress himself. And now
a new difficulty arose. He felt he would be questioned about the
supernatural visitors of the haunted chamber, and he was at a loss how to
answer. If he related the event of the night, he dreaded the ridicule of the
unbelieving Captain Campbell, who would assuredly laugh at him for being
conquered in spite of his boasting; and to be laughed at in the presence of
Sibyl was not to be endured. If, on the other hand he did not tell, he would
be obliged to continue the occupant of the haunted chamber while he
remained on the island—a thing he had not the slightest wish to do.
His toilet was finished before he could come to any conclusion; and still
debating the case, he descended the stairs, and entered the sitting-room they
had occupied the night before.
CHAPTER V.
Accustomed to the quiet unexciting life of the lonely, sea-girt island, the
events of the night had momentarily terrified her, albeit her nerves were
none of the weakest. The mysterious revelation of the dying man; his tale of
night, and storm, and crime; the wild, ghostly face at the window; and,
lastly, his sudden death, were quite enough to thrill for an instant with terror
even a stronger heart than that of the solitary old widow.
For some moments Mrs. Tom sat still, gazing alternately at the window
and on the ghastly face of the dead man before her, with a chill of horror
creeping over her.
"It's onpossible to sleep with a corpse in the house," thought Mrs. Tom,
as she climbed up the ladder leading to Carl's lofty dormitory; "leastways, I
couldn't sleep a wink, though I do s'pose that there lazy, sleepy-head of a
Carl could snore away jest as soundly as ef we was all dead in a heap. I
reckon I'll hev an hour's work getting him up. Here, you Carl! Carl! Get up,
I tell you!"
Then Mrs. Tom shook him lustily. The sleeper only replied by turning
over with a grunt.
"Carl! Carl! Lor' sakes! you great, sleepy, good-for-nothing, open your
eyes. I do b'lieve the last Judgment wouldn't wake you, once you got a-
snorin'. Ef nothin' else won't do, I'll try how you'll like this!"
And Mrs. Tom caught the unfortunate Carl by the hair and pulled it
vigorously, until that ill-used youth sprang upright, with a roar that might
have been heard half a mile off.
"Hush, Carl! Don't get mad, honey," said Mrs. Tom, soothingly. "I only
want you to come down stairs and set up with me. That there sick man's
dead."
"Yes, he's dead as can be; and it's the most lonesomest thing in the
world settin' up alone with a corpse, so I waked you up."
"Well don't sit up with him, then," said Carl, with a tremendous yawn.
"If he's dead, he won't mind staying alone all night, I suppose. Anyhow, I
know I ain't going to get up this time of night, if he was dead twice over."
And Carl lay down, and composed himself for another nap.
But Mrs. Tom was resolved not to be disobeyed; so, dropping the
pacific tone she had first adopted, she very summarily snatched away sheets
and quilts, pulled the mattress from under him, and overset poor Carl on the
floor, from which she soon made him spring up with a sound box on the ear.
"Now then," said the indignant old lady; "tell me ag'in you won't, will
ye? Now, look here, ef you ain't dressed and down stairs in five minutes, I'll
come back, and this ain't no circumstance to what you'll get. Tell me you
won't, indeed! There's no tellin' what the impidence of these scape-goats of
boys 'ill come to, ef they ain't minded in time," muttered the old lady to
herself, as she descended the ladder.
Carl's toilet, thus unpleasantly hastened, was soon complete, and he
descended to the lower room with a very sulky face, and grumbling
inwardly at his hard fate in being governed by so tyrannical a task-mistress:
"I don't see why the old feller couldn't have died somewhere else,"
inwardly muttered the ill-treated Mr. Henley; "a coming here and giving
bother, keeping a feller from his sleep of nights. It's downright mean!"
Morning was far advanced before either awoke. Mrs. Tom's first care
was to send Carl up to the lodge to inform its inmates of the death of her
guest, and desire Captain Campbell's immediate presence.
Mrs. Tom had been anxiously revolving in her mind the singular story
told her the night before, and resolved to reveal it to Captain Campbell and
learn his opinion about it.
"Now, Master Guy, what do you think of that?" exclaimed Mrs. Tom,
when she had finished.
"My dear madam," replied the young man, gravely, "the man, excited,
half crazed, delirious as he was, must have imagined all this. No such
horrible thing could have ever occurred in a Christian land."
"But he wasn't crazy," asserted Mrs. Tom, almost angry at having the
truth of the story doubted. "He was just as sensible, all through, as you or I.
He wasn't colirious a mite."
"Now, Mrs. Tom, it's not possible that, with all your good sense, you
can credit such an incredible tale."
"But, Master Guy, the man told it on his death-bed. Think o' that."
"And doubtless believed it, too; but that does not make it any more
probable. I have heard of such cases before. It is all owing to the
imagination, my dear lady. He had fancied this story, and thought about it so
long, that he at last believed it himself."
"I was just about to say so," said Guy, repressing a smile. "It could be
nothing else, you know. The hour of night, the thrilling tale, and the man's
dying cry that he saw her there, would have made you imagine anything;
therefore——"
But Mrs. Tom's wrath was rising. She had been inwardly priding herself
on the sensation her story would create, and this fall to her hopes was more
than she could patiently endure.
"It's no sich thing," she cried, in a voice louder and sharper than she was
in the habit of using to any one but the unfortunate Carl. "I seen it all with
my two blessed eyes, and nobody's goin' to make me believe it was my
'magination. 'Magination, indeed!" continued the old lady, in a tone of
profound contempt. "Thank my divine Master, I never was troubled with
'magination since the day I was born, and 'tain't likely I'd begin now in my
old age o' life. I allers hid a great respect for you, Master Guy; but I'm a
poor, lone 'ooman, and can't stand to be onsulted by nobody. I hain't no
doubt you mean well, but I like to hev people b'lieve me when I do tell the
truth. Scat, you hussy! afore I twist your neck for you."
The latter part of this oration was addressed to Trot, the mottled cat, and
was accompanied by a kick, which ejected that unoffending member of
society out of doors, much quicker than was at all agreeable. Captain
Campbell, quite unprepared for this burst of eloquence, listened in
amazement, and seized the first opportunity, when angry Mrs. Tom paused
for breath, to humbly apologize for his offense.
"My dear Mrs. Tom," said the young captain, humbly, "I had not the
remotest intention of offending you, and most deeply regret having done so.
I have fallen into a bad habit, of late, of doubting everything; and really this
story appeared so improbable, that I think I may be pardoned for not
yielding it full credit on the spot. Come, now, my dear madam," he
continued, seeing the cloud still hanging on Mrs. Tom's honest face, "let's
be friends still; and I promise for the future to believe everything you
choose to tell me, no matter what it is."
Good Mrs. Tom was not proof against the insinuating tone of Master
Guy, who had always been her favorite; so the cloud disappeared, and her
own cheery smile once more beamed forth.
Having arranged that Lem should come down and prepare a grave
during the morning, Captain Campbell left the cottage, and went in search
of Mr. Drummond and his sister to tell them what he had heard.
He found them down on the shore. Sibyl stood on a high cliff, her dress
fluttering in the morning breeze, her hat off, and her long, glittering, jetty
tresses waving behind her like a banner. The wind that came sweeping
across the waters had deepened the glow on her crimson cheeks and lips,
and sent a living light into her glorious eyes.
Sibyl laughed gayly, as she sprang down on the white, level sands
between her brother and lover.
"I was only looking out for a sail, which I failed to discover," she
replied.
"Well, Campbell," said Drummond, "had your old lady down below any
important revelations to make, that she sent for you in such haste this
morning?"
"Not very important in my eyes, though they are in hers," replied the
young captain. "She wished to reveal the dying deposition of our passenger,
Richard Grove."
"And what had he to tell? Was I right in saying remorse for some crime
preyed on him more than mere illness?"
Captain Campbell, condensing the story, gave them the outline and
principal facts in a few words. Both listened with deep interest; but when he
spoke of the pale, haggard face, with its dark, waving hair, glaring at them
through the window, Willard Drummond started violently, and turned pale.
Sibyl's eagle eyes were fixed on his face, and she alone observed it.
"And what does Mrs. Tom take this nocturnal visitor to be?" inquired
Sibyl. "A mortal like herself, or a spirit disembodied?"
"Oh, a ghost, of course," replied her brother. "The spirit, perhaps, of the
woman walled up to perish in the room with the murdered man. Ugh! the
story altogether is hideous enough to give one the nightmare! And now that
you have learned all, I believe I'll go and send Lem down to inter the body."
"I cannot tell. Yesterday I would have joined your brother in laughing at
it; but, to-day——"
He paused.
"Good Heavens, Willard! Then the story told by the negroes is true?"
"It certainly seems like it. Had any one else told me what I experienced,
I should think they were humbugging me; but I cannot discredit what I saw
with my own eyes."
"Exactly like the description Mrs. Tom gives of the face that appeared at
her window—white as that of the dead, with dark, streaming hair, and wild,
vacant, dark eyes."
She paused.
"Oh, Willard! what if this house has been the scene of that mystery the
dying man spoke of! I thought of it from the first."
"And yet nothing could induce your brother to adopt your belief. He
would laugh at our credulity, were we to tell him what we have seen and
heard."
"Yes; and, perhaps I had better not tell him, Willard. I will have your
room changed, and my own likewise. Even if they are less comfortable,
they will be more endurable than to be disturbed by midnight specters."
"Be it so, then, fairest Sibyl," he said, gayly. And turning, they walked
together to the Lodge.
CHAPTER VI.
Toward noon, as they were sauntering along the sun-shiny beach, she
hanging on his arm, while he softly whispered the words "ladies love to
hear," they espied a boat advancing toward them. Sibyl raised her telescope
to survey the new-comers.
"Rev. Mr. Mark Brantwell and wife," she exclaimed, in tones of surprise
and pleasure. "Guy has doubtless called upon them, and told them I was
here."
"Friends of yours?" asked Willard.
The boat at this moment touched the shore, and Sibyl, disengaging her
arm, ran down to meet them. Willard more leisurely followed, just in time
to see his lady-love folded in the arms of a gentleman who sprang from the
boat.
The stranger was of middle age, married, and a clergyman; yet, in spite
of all, Mr. Drummond felt a sudden twinge of jealousy and anger at
beholding the embrace. But the next moment jealousy, anger, every feeling
was swallowed up in intense astonishment, not unmingled with
superstitious horror. For as the clergyman turned round, and Willard
obtained a full view of his face, he recognized the countenance of him he
had seen years before in that mystic vision at the Egyptian's.
For a moment he stood regarding him, pale with wonder; and he only
awoke from his trance of surprise, when he heard the clear, ringing voice of
Captain Campbell, as he approached him, saying, with a hearty slap on the
shoulder:
"Why, Drummond, man alive, what ails you? You are as pale as a
ghost!"
"Are you ill?" said Sibyl, anxiously, as she approached, leaning on the
arm of Mrs. Brantwell.
"Why, Sibyl, have you grown nervous and cowardly?" exclaimed Mr.
Brantwell—"you, who used to be as bold and daring as a mountain eaglet.
But perhaps," he added, glancing meaningly at Willard, "it is only where
some very particular friend is concerned that your fears are thus easily
aroused."
Willard smiled slightly, while Sibyl's dark face grew crimson as she
hurried on with increased rapidity, drawing her companion with her, and
leaving the gentlemen behind.
When they reached the lodge Sibyl left her brother to entertain their
guests, while she set about preparing luncheon. When the meal was over
Mrs. Brantwell said:
"And now, Miss Sibyl, I have come to carry you off. It is three years
since I have had the pleasure of seeing you, and I shall certainly take you
with me now. Come, no excuses—I will not hear one of them."
"But, my dear Miss Campbell, you must come—do you hear that? Your
brother can certainly do without you for a week."
"Yes, and glad to be rid of her, too," said the gallant Captain Campbell.
Sibyl stole a glance toward Drummond from under her long eyelashes.
He was sitting, looking out of the window with an exceedingly dissatisfied
frown on his brow. Mrs. Brantwell perceived the glance, and broke out
again with her usual bluntness:
"And as for that other gentleman you are looking at, Sibyl, I am sure he
will be generous enough to spare you for a few days, as he will, in all
probability, have enough of you before long."
"You will have to come, you see, Miss Sibyl," said Mr. Brantwell,
laughing.
"Of course, she will," added his frank spouse; "and upon my word I
think I am doing her a favor in taking her from this lonesome island, and
letting her see a little of civilized life at our hands; though, from Sibyl's
looks, I should say she doesn't feel at all grateful for it."
"Come, Sibyl, there is no help for it, you see," said Guy. "Drummond
and I will get along swimmingly during your absence. He can keep his hand
in, in making love to Aunt Moll, while I try my powers of persuasion over
Mrs. Tom."
"Lord bless me! Mr. Drummond, just turn round, will you, and tell Sibyl
she may go. Nothing earthly will induce her to come till you give
permission. I'm sure if you were her father she couldn't be more afraid of
displeasing your lordship."
"Well, I'm sure that's a mercy to be thankful for. Now, perhaps, you will
come, Sibyl," said the plain-spoken old lady; "and as for you, sir, I shall
expect to see you at the parsonage every day with Master Guy."
"I shall be most happy," said Willard, his face brightening a little, while
Sibyl's eyes sparkled with anticipation.
"Well, now, run and get ready," said Mrs. Brantwell, turning to Sibyl.
Sibyl soon reappeared, dressed for her journey. And then, as the
afternoon was far advanced, the whole party descended to the beach. The
adieus were spoken, the boat pushed off, leaving the two young men alone
on the sands.
"I prefer remaining here," said Willard, who had not yet recovered his
good humor, after what he was pleased to call Sibyl's desertion.
"Well, then, I'll remain with you," said Guy, who was the soul of
frankness and good temper.
"Nonsense, my dear fellow. I insist upon it. I hope you do not think of
standing on ceremony with me?"
"So be it, then," said Captain Campbell, gayly, as he sprang into his
boat, pushed off, and shot like an arrow out into the water.
The young girl's song ceased, and turning, she leaped lightly as a young
deer from her fairy perch, without perceiving him who stood so intently
regarding her. Leaping from rock to rock with a fleetness that awoke the
surprise of Willard, she reached the road and disappeared within she cottage
of Mrs. Tom.
Everything was forgotten now but the one intense desire of knowing
who this radiant sea-nymph was. Turning, therefore, into the path she had
just taken, he approached the cottage and encountered Carl at the door.