Cyber Adversary Characterization: Auditing the Hacker Mind
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost
- 出版商: Syngress
- 售價: $1,854
- 貴賓價: 9.5 折 $1,761
- 語言: 英文
- 頁數: 356
- 裝訂: Paperback
- ISBN: 1931836116
- ISBN-13: 9781931836111
Develop a Well-Measured Defense Against Cybercriminals
When we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That’s lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.-from the preface by Richard Thieme
- Kevin Mitnick Exposed
The infamous hacker Kevin D. Mitnick allows himself and one of his more significant hacks to be weighed and measured.
- Cyber Terrorist: Just a Media Buzzword?
Learn how the second we become narrow-minded about the security of our organizations and the resolve of our cyber enemy is the second we become vulnerable to some of the worlds most dangerous minds.
- Understand Adversary Models
Can you answer the same questions your adversary will be asking, such as “If I were to attack this target, what effort will be made to identify me, if my attack is detected?”
- Characterize Specific Threats
Identify where the real threats to your most critical assets lay and learn to answer the question of why you believe those threats are so real.
- Manage the Insider Threat
See how the key to early insider threat detection is in understanding how disgruntled employees move down the critical pathway towards an attack
- Characterize the Extremes-Terrorists and Nation States
See why the authors believe that the concept of cyber terrorism should be viewed as a very real and critical emerging threat.
- Monitor a Cyber Stalker
Learn how software concepts such as “WarmTouch” can help restore the psychological insights lost through traditional, technology driven insider detection techniques.
- Case Studies Offer Insight and Lessons
See how characterization theory can be used to analyze some of histories more memorable incidents with 20/20 vision.