Cyber Adversary Characterization: Auditing the Hacker Mind

Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost

  • 出版商: Syngress Media
  • 售價: $2,170
  • 貴賓價: 9.5$2,062
  • 語言: 英文
  • 頁數: 356
  • 裝訂: Paperback
  • ISBN: 1931836116
  • ISBN-13: 9781931836111
  • 相關分類: 駭客 Hack
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Description:

Develop a Well-Measured Defense Against Cybercriminals
When we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That’s lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.-from the preface by Richard Thieme

  • Kevin Mitnick Exposed
    The infamous hacker Kevin D. Mitnick allows himself and one of his more significant hacks to be weighed and measured.
  • Cyber Terrorist: Just a Media Buzzword?
    Learn how the second we become narrow-minded about the security of our organizations and the resolve of our cyber enemy is the second we become vulnerable to some of the worlds most dangerous minds.
  • Understand Adversary Models
    Can you answer the same questions your adversary will be asking, such as “If I were to attack this target, what effort will be made to identify me, if my attack is detected?”
  • Characterize Specific Threats
    Identify where the real threats to your most critical assets lay and learn to answer the question of why you believe those threats are so real.
  • Manage the Insider Threat
    See how the key to early insider threat detection is in understanding how disgruntled employees move down the critical pathway towards an attack
  • Characterize the Extremes-Terrorists and Nation States
    See why the authors believe that the concept of cyber terrorism should be viewed as a very real and critical emerging threat.
  • Monitor a Cyber Stalker
    Learn how software concepts such as “WarmTouch” can help restore the psychological insights lost through traditional, technology driven insider detection techniques.
  • Case Studies Offer Insight and Lessons
    See how characterization theory can be used to analyze some of histories more memorable incidents with 20/20 vision.

 

商品描述(中文翻譯)

描述:
建立一個對抗網絡犯罪分子的完善防禦。當我們談到駭客思維時,我們指的是一個受到各種不同動機驅使的不良分子的思維。我們指的是下載他人編寫的腳本並通過點擊按鈕執行的腳本小子,我們指的是缺乏衝動控制的破壞者,我們指的是數據盜竊者,然後我們指的是使用該數據進行勒索、企業或工業間諜活動、國家級間諜活動、身份盜竊、大規模盜竊、勒索、惡意報復或恐怖活動的所有人。這是很多種類的思維,需要被理解、被概述、被滲透、被全面了解。- Richard Thieme 的前言

- Kevin Mitnick 揭露
臭名昭著的駭客 Kevin D. Mitnick 允許自己和他的一次重大駭客行為受到評估和衡量。

- 網絡恐怖主義者:只是媒體的流行詞語嗎?
了解當我們對我們組織的安全和我們的網絡敵人的決心變得狹隘時,我們變得容易受到世界上一些最危險的思維的攻擊。

- 理解對手模型
你能回答與你的對手將會問的相同問題嗎?例如:“如果我要攻擊這個目標,如果我的攻擊被檢測到,將會有什麼努力來識別我?”

- 描述具體威脅
確定你最重要資產的真正威脅所在,並學會回答為什麼你相信這些威脅是如此真實的問題。

- 管理內部威脅
了解不滿的員工如何沿著關鍵途徑向攻擊發展,這是早期內部威脅檢測的關鍵。

- 描述極端情況-恐怖分子和國家
了解為什麼作者認為網絡恐怖主義的概念應該被視為一個非常真實和關鍵的新興威脅。

- 監控網絡跟蹤者
了解軟件概念,如“WarmTouch”如何通過傳統的技術驅動的內部檢測技術來恢復失去的心理洞察力。

- 案例研究提供洞察和教訓
看看如何使用特徵化理論以20/20的視野分析一些歷史上更具有紀念意義的事件。