Muutke küpsiste eelistusi

E-raamat: Reverse Deception: Organized Cyber Threat Counter-Exploitation

  • Formaat: 352 pages
  • Ilmumisaeg: 06-Jul-2012
  • Kirjastus: Osborne/McGraw-Hill
  • Keel: eng
  • ISBN-13: 9780071772501
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 48,67 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 352 pages
  • Ilmumisaeg: 06-Jul-2012
  • Kirjastus: Osborne/McGraw-Hill
  • Keel: eng
  • ISBN-13: 9780071772501
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.







In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your networks vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.





Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement
Foreword xiii
Acknowledgments xxxv
Introduction xxxv
Chapter 1 State of the Advanced Cyber Threat
1(22)
Have You Heard About the APT?
2(1)
APT Defined
2(1)
What Makes a Threat Advanced and Persistent?
3(4)
Examples of Advanced and Persistent Threats
7(1)
Moonlight Maze
8(1)
Stakkato
9(1)
Titan Rain
10(1)
Stormworm
11(1)
GhostNet
12(1)
Byzantine Hades/Foothold/Candor/Raptor
13(1)
Operation Aurora
14(1)
Stuxnet
15(1)
Russian Business Network
16(2)
New Generation of Botnets and Operators
18(1)
Operation Payback
19(1)
Conclusion
20(3)
Chapter 2 What Is Deception?
23(28)
How Does Deception Fit in Countering Cyber Threats?
24(1)
Six Principles of Deception
25(1)
Focus
25(1)
Objective
26(1)
Centralized Planning and Control
26(1)
Security
26(1)
Timeliness
27(1)
Integration
27(1)
Traditional Deception
28(1)
Feints---Cowpens
28(2)
Demonstrations---Dorchester Heights
30(1)
Ruses---Operation Mincemeat (the Unlikely Story of Glyndwr Michael)
30(1)
Displays-A Big Hack Attack
31(4)
Why Use Deception?
35(2)
The First US Army Group Deception
37(2)
Russian Maskirovka
39(1)
Deception Maxims
40(1)
"Magruder's Principle"---Exploitation of a COG's Perception or Bias
40(1)
"Limitations to Human Information Processing"
41(1)
"Multiple Forms of Surprise"
42(1)
"Jones' Dilemma"
42(1)
"Choice of Types of Deception"
42(1)
"Husbanding of Deception Assets"
43(1)
"Sequencing Rule"
43(1)
"Importance of Feedback"
43(1)
"Beware of Possible Unwanted Reactions"
43(1)
"Care in the Design of Planned Placement of Deceptive Material"
44(1)
Understanding the Information Picture
44(1)
Half-Empty Version
45(1)
Half-Full Version
46(1)
A Question of Bias
46(2)
Totally Full Version
48(1)
Step-Beyond Version
48(1)
Two-Steps-Beyond Version
49(1)
Conclusion
49(2)
Chapter 3 Cyber Counterintelligence
51(34)
Fundamental Competencies
52(11)
Applying Counterintelligence to the Cyber Realm
63(1)
Sizing Up Advanced and Persistent Threats
64(1)
Attack Origination Points
65(2)
Numbers Involved in the Attack
67(1)
Risk Tolerance
68(1)
Timeliness
69(1)
Skills and Methods
70(2)
Actions
72(1)
Objectives
73(1)
Resources
74(1)
Knowledge Source
75(9)
Conclusion
84(1)
Chapter 4 Profiling Fundamentals
85(36)
A Brief History of Traditional Criminal Profiling
87(3)
The Emergence of Cyber Profiling
90(2)
Acquiring an Understanding of the Special Population
92(5)
The Objectives of Profiling
97(1)
The Nature of Profiling
98(2)
Basic Types of Profiling
100(3)
Two Logical Approaches to Profiling: Inductive vs. Deductive
103(1)
Information Vectors for Profiling
104(1)
Time
104(2)
Geolocation
106(2)
Skill
108(1)
Motivation
109(2)
Weapons and Tactics
111(2)
Socially Meaningful Communications and Connections
113(4)
Conclusion
117(1)
References
117(4)
Chapter 5 Actionable Legal Knowledge for the Security Professional
121(16)
How to Work with a Lawyer
123(2)
What You Should Know About Legal Research
125(1)
Online Legal Resources
126(3)
Common Legal Terms
129(2)
The Role of Statutes in Our Legal System
131(1)
How to Find a Law
131(1)
Do Your Background Homework
132(1)
Reading the Law
133(1)
Communicating with Lawyers
134(1)
Ethics in Cyberspace
134(2)
Conclusion
136(1)
Chapter 6 Threat (Attacker) Tradecraft
137(34)
Threat Categories
138(2)
Targeted Attacks
140(3)
Opportunistic Attacks
143(4)
Opportunistic Turning Targeted
147(1)
Evolution of Vectors
148(4)
Meet the Team
152(2)
Criminal Tools and Techniques
154(1)
Tailored Valid Services
154(5)
Academic Research Abuse
159(2)
Circles of Trust
161(3)
Injection Vectors
164(6)
Conclusion
170(1)
Chapter 7 Operational Deception
171(28)
Deception Is Essential
173(4)
Tall Tale 1
177(3)
Postmortem
180(3)
Tall Tale 2
183(4)
Postmortem
187(1)
Tall Tale 3
187(4)
Postmortem
191(1)
Tall Tale 4
192(1)
Honeypot 1
193(4)
Postmortem
197(1)
Conclusion
198(1)
Chapter 8 Tools and Tactics
199(50)
Detection Technologies
201(1)
Host-Based Tools
202(1)
Antivirus Tools
203(1)
Digital Forensics
203(1)
Security Management Tools
204(1)
Network-Based Tools
205(1)
Firewalls
206(1)
Intrusion Detection/Prevention Systems
207(1)
Deception Technologies
207(2)
Honeywalls
209(11)
Honeynets as Part of Defense-in-Depth
220(1)
Research vs. Production Honeynets
221(2)
Honeynet Architectures
223(2)
Honeywall Accreditation
225(1)
Content Staging
226(3)
Content Filling
229(1)
Honeynet Training
230(1)
Honeynet Objectives
230(1)
Honeynet Risks and Issues
231(2)
Check Yourself Before You're Wrecked
233(1)
What's the Status of Your Physical Security?
234(1)
How Does Your Wireless Network Look?
234(2)
What's Traveling on Your Network?
236(2)
What About Your Host/Server Security?
238(3)
How Are Your Passwords?
241(2)
How's Your Operational Security?
243(2)
Crimeware/Analysis Detection Systems
245(1)
What Happened on Your Box?
245(1)
What Did That Malicious Software Do?
246(1)
Conclusion
247(2)
Chapter 9 Attack Characterization Techniques
249(32)
Postincident Characterization
250(2)
Another Tall Tale
252(1)
Discovery
253(1)
Malware
254(1)
Aftermath
255(1)
Real-World Tactics
256(1)
Engaging an Active Threat
256(9)
Traffic, Targets, and Taxonomy
265(13)
Aftermath
278(1)
Conclusion
279(2)
Chapter 10 Attack Attribution
281(40)
A Brief Note About Levels of Information Present in Objects
283(2)
Profiling Vectors
285(1)
Time
285(2)
Motivations
287(11)
Social Networks
298(6)
Skill Level
304(3)
Vector Summary
307(1)
Strategic Application of Profiling Techniques
308(1)
Example Study: The Changing Social Structure of the Hacking Community
308(4)
Micro-and Macro-Level Analyses
312(1)
The Rise of the Civilian Cyber Warrior
313(1)
The Balance of Power
314(2)
Potential Civilian Cyber Warrior Threats
316(1)
Conclusion
317(1)
References
318(3)
Chapter 11 The Value of APTs
321(18)
Espionage
322(1)
Costs of Cyber Espionage
323(1)
Value Network Analysis
324(1)
APTs and Value Networks
325(2)
The RSA Case
327(2)
The Operation Aurora Case
329(4)
APT Investments
333(1)
APTs and the Internet Value Chain
333(1)
It's All Good(s)
334(1)
Bitcoin in the Future?
335(2)
Conclusion
337(2)
Chapter 12 When and When Not to Act
339(26)
Determining Threat Severity
340(1)
Application Vulnerability Scenario
341(1)
Targeted Attack Scenario
341(1)
What to Do When It Hits the Fan
342(1)
Block or Monitor?
342(1)
Isolating the Problem
343(1)
Distinguishing Threat Objectives
344(1)
Responding to Actionable Intelligence
345(1)
Cyber Threat Acquisition
346(1)
Distinguishing Between Threats
346(11)
Processing Collected Intelligence
357(1)
Determining Available Engagement Tactics
358(1)
Engaging the Threat
359(1)
Within Your Enterprise
359(1)
External to Your Enterprise
360(1)
Working with Law Enforcement
361(1)
To Hack or Not to Hack (Back)
361(1)
To What End?
362(1)
Understanding Lines (Not to Cross)
363(1)
Conclusion
363(2)
Chapter 13 Implementation and Validation
365(28)
Vetting Your Operations
366(3)
Vetting Deceptions
369(1)
Vetting Perceptual Consistency in a Deception
370(2)
Vetting Engagements
372(3)
Putting This Book to Use with Aid from Professionals
375(2)
How to Evaluate Success
377(1)
Getting to the End Game
378(12)
Conclusion
390(3)
Glossary 393(10)
Index 403
Sean M. Bodmer CISSP® CEH® Sean M. Bodmer is Director of Federal and Military Programs at Savid Corporation, Inc. Sean is an active Honeynet researcher specializing in the analysis of signatures, patterns, and behaviors of malware and attackers. Most notably he has spent several years leading the operations and analysis of advanced intrusion detection systems (honeynets) where the motives and intent of attackers and their tools can be captured and analyzed in order to generate actionable intelligence to further protect customer networks. Sean has worked in various Systems Security Engineering roles for various federal government entities and private corporations over the past decade in the Washington D.C. Metro area. Sean has lectured across the United States at industry conferences such as DEFCON, PhreakNIC, DC3, NW3C, Carnegie Mellon CERT, and the Pentagon Security Forum all covering the aspects of attack and attacker assessment profiling in order to identify the true motivations and intent behind cyber attacks.





Gregory Carpenter, CISM, has earned numerous professional awards including the Joint Task Force for Global Network Operations Officer of the Quarter, recognition in the Who's Who in International Business, and serves on the U.S. Government's Cross Domain Solution Working Group, the Joint Wireless Working Group, and many others. As Team Chief of Information Operations, He develops plans and oversees the use of full -spectrum Information Operations which includes Computer Network Operations, Electronic Warfare, Operations Security, Psychological Operation and Military Deception in support of military and National Objectives. He develops, reviews and proposes Military Operational and & National Policy strategies for Cyber Operations. He has received numerous professional awards, including the prestigious National Security Agency Military Performer of the Year in 2007 and the Joint Task Force for Global Network Operations Officer of the Quarter, 2nd Qtr 2006. He was recognized in Whos Who in International Business in 1997 the same year he was the 1st US Army Non-Commissioned officer of the Year (1st Runner-up).







Jade Anton Jones, J.D., has 15 years practice experience: areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.