Buch, Englisch, 464 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 863 g
Organized Cyber Threat Counter-Exploitation
Buch, Englisch, 464 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 863 g
ISBN: 978-0-07-177249-5
Verlag: McGraw-Hill Education
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.In-depth counterintelligence tactics to fight cyber-espionage"A comprehensive and unparalleled overview of the topic by experts in the field."--SlashdotExpose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. - Establish the goals and scope of your reverse deception campaign
- Identify, analyze, and block APTs
- Engage and catch nefarious individuals and their organizations
- Assemble cyber-profiles, incident analyses, and intelligence reports
- Uncover, eliminate, and autopsy crimeware, trojans, and botnets
- Work with intrusion detection, anti-virus, and digital forensics tools
- Employ stealth honeynet, honeypot, and sandbox technologies
- Communicate and collaborate with legal teams and law enforcement
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Ch 1. Introduction
Ch 2. Deception Throughout History to Today
Ch 3. The Applications & Goals of Cyber Counterintelligence
Ch 4. The Missions and Outcomes of Criminal Profiling
Ch 5. Legal & Ethical Aspects of Deception
Ch 6. Attack Tradecraft
Ch 7. Operational Deception
Ch 8. Tools, Tactics & Procedures
Ch 9. Attack Attribution
Ch 10. Black Hat Motivators
Ch 11. Understanding Advanced Persistent Threats
Ch 12. When To & When Not To Act
Ch 13. Implementation & Validation Tactics
References
Appendices




