Muutke küpsiste eelistusi

E-raamat: Malware, Rootkits & Botnets A Beginner's Guide

  • Formaat: 432 pages
  • Sari: Beginner's Guide
  • Ilmumisaeg: 05-Sep-2012
  • Kirjastus: Osborne/McGraw-Hill
  • Keel: eng
  • ISBN-13: 9780071792059
  • Formaat - EPUB+DRM
  • Hind: 48,67 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 432 pages
  • Sari: Beginner's Guide
  • Ilmumisaeg: 05-Sep-2012
  • Kirjastus: Osborne/McGraw-Hill
  • Keel: eng
  • ISBN-13: 9780071792059

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away.

Malware, Rootkits & Botnets: A Beginner's Guidefeatures:





Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work
Acknowledgments xv
Foreword xvii
Introduction xxi
PART I Establishing the Foundation
1 Getting In Gear
3(6)
A Malware Encounter
4(1)
A Brief Overview of the Threat Landscape
5(1)
Threat to National Security
6(1)
Starting the Journey
7(1)
We've Covered
8(1)
References
8(1)
2 A Brief History of Malware
9(30)
Computer Viruses
10(7)
Classification of Computer Viruses
11(5)
Early Challenges
16(1)
Malware
17(16)
Classification of Malware
18(11)
Evolution of Malware
29(4)
Riskware
33(2)
Classification of Riskware
33(2)
Malware Creation Kits
35(1)
The Impact of Malware
36(1)
We've Covered
36(3)
3 Cloak of the Rootkit
39(16)
What Is a Rootkit?
40(1)
Environment Mechanics
41(6)
The Operating System Kernel
41(1)
User Mode and Kernel Mode
41(1)
Rings
42(1)
Switching from User Mode to Kernel Mode
43(4)
Types of Rootkits
47(1)
User-Mode Rootkits
47(1)
Kernel-Mode Rootkits
47(1)
Rootkit Techniques
48(5)
Hooking
48(3)
DLL Injection
51(1)
Direct Kernel Object Manipulation
52(1)
Tackling Rootkits
53(1)
We've Covered
54(1)
4 Rise of the Botnets
55(30)
What Is a Botnet?
56(8)
Main Characteristics
57(1)
Key Components
58(2)
C&C Structure
60(4)
Botnet Usage
64(5)
Distributed Denial of Service Attack
65(1)
Click Fraud
66(1)
Spam Relay
66(2)
Pay-Per-Install Agent
68(1)
Large-Scale Information Harvesting
69(1)
Information Processing
69(1)
Botnet Protective Mechanisms
69(8)
Bulletproof Hosting
70(1)
Dynamic DNS
70(1)
Fast Fluxing
71(3)
Domain Fluxing
74(3)
The Fight Against Botnets
77(4)
The Technical Front
78(1)
The Legal Front
79(2)
We've Covered
81(1)
References
82(3)
PART II Welcome to the Jungle
5 The Threat Ecosystem
85(28)
The Threat Ecosystem
86(16)
The Technical Element
86(11)
The Human Element
97(4)
The Evolution of the Threat Ecosystem
101(1)
Advanced Persistent Threat
102(6)
The Attack Method
102(4)
The Attack Profitability
106(2)
Malware Economy
108(3)
Malware Outsourcing
108(3)
We've Covered
111(2)
6 The Malware Factory
113(42)
The Need to Evade Antivirus
115(26)
Malware Incident Handling Process
116(7)
Malware Detection
123(6)
Circumventing the Antivirus Product
129(12)
The Need for an Army of Malware
141(4)
Next-Generation Malware Kits
141(1)
Stand-Alone Armoring Tools
142(2)
The Impact of an Armored Army of Malware
144(1)
The Malware Factory
145(10)
The Malware Assembly Line
145(7)
The Proliferation of Attacker Tools
152(1)
Malware Population Explosion
153(1)
We've Covered
154(1)
7 Infection Vectors
155(30)
Infection Vectors
156(27)
Physical Media
159(1)
E-mail
160(4)
Instant Messaging and Chat
164(2)
Social Networking
166(5)
URL Links
171(8)
File Shares
179(1)
Software Vulnerabilities
179(4)
The Potential of Becoming an Infection Vector
183(1)
We've Covered
183(2)
8 The Compromised System
185(28)
Introduction
186(1)
The Malware Infection Process
187(13)
Installation of Malware Files
191(5)
Setting Up Malware Persistency
196(1)
Removing Evidence of the Malware Installer
197(1)
Passing Control to the Malware
198(2)
The Active Malware
200(8)
Maintaining the Foothold
201(3)
Communicating with the Attacker
204(3)
Executing the Payload
207(1)
We've Covered
208(5)
PART III The Enterprise Strikes Back
9 Protecting the Organization
213(42)
The Threat Incident Responders
215(1)
Understanding the Value of the System
216(8)
Value to the Organization
216(5)
Value to the Attacker
221(3)
Understanding the Characteristics of the System
224(7)
System Type
225(2)
Operational Impact
227(1)
Sensitivity of Hosted Data
228(1)
Users of the System
228(1)
Network Location
229(1)
Accessibility to the Asset
229(1)
Asset Access Rights
230(1)
Recovery
230(1)
System Status
231(1)
Prioritizing the Systems
231(1)
The Organization's Security Posture
232(1)
Understanding the Cost of Compromise
232(2)
Direct Cost
232(1)
Indirect Cost
233(1)
Protecting the Systems
234(9)
Threat Modeling
234(2)
Identifying the Appropriate Solutions
236(3)
Proactive Threat Detection
239(4)
Creating an Incident Response Plan
243(9)
Identify Different Compromise Scenarios
244(1)
Identify Solution Patterns
244(1)
Define Roles and Responsibilities
245(2)
Establish Protocols
247(2)
Conduct Periodic Dry-Runs
249(1)
Review and Improve
250(2)
Putting Everything into Action
252(1)
Beyond Protection
252(1)
We've Covered
252(3)
10 Detecting the Threat
255(18)
Establishing a Baseline
256(2)
Establishing a Network Baseline
257(1)
Establishing a Host Baseline
257(1)
Detecting Anomalies
258(3)
Detecting Network Anomalies
259(1)
Detecting Host Anomalies
260(1)
Isolating the Source of the Anomaly
261(1)
Diving into the Compromised Asset
261(11)
Pinpointing the Malware
261(9)
Classifying the Malware Based on Its Attack Directive
270(2)
We've Covered
272(1)
11 Mitigating the Threat
273(24)
Introduction
274(1)
Threat Mitigation
275(1)
Immediate Response
276(2)
Containment
276(1)
Verification
276(1)
Threat Detection and Classification
277(1)
Remediation and Restoration
277(1)
Proactive Response
278(12)
Preventive Measures
279(10)
Conducting a Periodic Security Audit
289(1)
The Threat from Insiders
290(3)
Who Are the Insider Threats?
290(1)
Mitigating the Insider Threat
290(3)
Be Vigilant
293(1)
We've Covered
293(4)
PART IV Final Thoughts
12 The Never-Ending Race
297(10)
Introduction
298(1)
A Short Review of the Book
298(1)
Predictions
299(5)
The Future of Malware
299(4)
The Future of Rootkits
303(1)
The Future of Botnets
304(1)
The Good Guys Are Busy Too
304(1)
The Adventure Has Just Begun
305(1)
We've Covered
305(2)
A The Bootup Process
307(4)
The Windows Bootup Process
308(3)
BIOS-Based System
308(2)
EFI-Based System
310(1)
B Useful Links
311(4)
Vulnerability Information
312(1)
Free Online Security Products
312(1)
Free File Scanner and Analysis Tools
312(1)
Web Security
312(1)
Malware Trackers
312(1)
Other Important Links
313(2)
Glossary 315(18)
Index 333
Christopher C. Elisan, a seasoned reverse engineer and malware researcher, is the principal malware scientist at RSA NetWitness. He frequently contributes expert opinion about malware, botnets, and advance persistent threats for leading publications, including USA Today, InformationWeek, and Dark Reading.