Gragido / Pirc | Cybercrime and Espionage | E-Book | www.sack.de
E-Book

E-Book, Englisch, 272 Seiten

Gragido / Pirc Cybercrime and Espionage

An Analysis of Subversive Multi-Vector Threats
1. Auflage 2011
ISBN: 978-1-59749-614-8
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark

An Analysis of Subversive Multi-Vector Threats

E-Book, Englisch, 272 Seiten

ISBN: 978-1-59749-614-8
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark



Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO. - Includes detailed analysis and examples of the threats in addition to related anecdotal information - Authors' combined backgrounds of security, military, and intelligence, give you distinct and timely insights - Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them

Will Gragido possesses over 18 years of information security experience. A former United States Marine, Mr. Gragido began his career in the data communications information security and intelligence communities. After USMC, Mr. Gragido worked within several information security consultancy roles performing and leading red teaming, penetration testing, incident response, security assessments, ethical hacking, malware analysis and risk management program development. Mr.Gragido has worked with a variety of industry leading research organizations including International Network Services, Internet Security Systems / IBM Internet Security Systems X-Force, Damballa, Cassandra Security, HP DVLabs, and now RSA NetWitness, where he leads the RSA FirstWatch Advanced Threat Intelligence team. Will has deep expertise and knowledge in operations, analysis, management, professional services & consultancy, pre-sales / architecture and strong desire to see the industry mature and enterprises & individuals become more secure. Will is a long-standing member of the ISC2, ISACA, and ISSA. Mr.Gragido holds the CISSP and CISA certifications, as well as accreditations in the National Security Agency's Information Security Assessment Methodology (IAM) and Information Security Evaluation Methodology (IEM). Additionally, Mr.Gragido is a Faculty Member of the IANS Institute where he specializes in advanced threat, botnet, and malware analysis. Mr.Gragido is a graduate of DePaul University and is currently preparing for graduate school. An internationally sought after speaker, Will is the co-author of Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats.

Gragido / Pirc Cybercrime and Espionage jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Front Cover;1
2;Cybercrime and Espionage An Analysis of SubversiveMultivector Threats;4
3;Copyright;5
4;Contents;6
5;Foreword;10
6;Preface;12
7;About the authors;16
8;Acknowledgements;14
9;Chapter 1: Cybercrime and Espionage and the New Security 101;17
9.1;Introduction;17
9.2;He Who Does Not Prevent a Crime When He Can, Encourages It;18
9.3;What's Old Is New Again;19
9.4;A Changing World;23
9.5;Cybercriminal Statistics: U.S. and Abroad;24
9.6;The Statistics of Cybercrime;25
9.7;Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals;26
9.8;Trends in 2011;29
9.9;Myopic to the Catastrophic: Advanced Persistent Threats;32
9.10;Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and Espionage;34
9.11;Agendas in Next Generation Cybercriminal Activity;35
9.12;The Coming Decade;35
9.13;Summary;36
10;Chapter 2: Evolution Revolution;37
10.1;Introduction;37
10.2;Communication;37
10.3;Criminal Activity;43
10.4;Summary;49
11;Chapter 3:The Silent Killer: HowRegulatory ComplianceHas Worsened the Stateof Information Security;51
11.1;Introduction;51
11.2;Regulatory Compliance Telemetry;52
11.3;Transborder Data Flow Restrictions;52
11.4;ISO Security Standards;56
11.5;Health Insurance Portability and Accountability Act (HIPAA);57
11.6;Family Education Rights and Privacy Act (FERPA);58
11.7;Payment Card Industry Data Security Standard (PCI DSS);59
11.8;North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP);61
11.9;Summary;62
11.10;References;63
12;Chapter 4: Mediating The Great Divorce : The convergenceof Physical andLogical Security;65
12.1;Introduction;65
12.2;The CISSP Physical Security Domains;66
12.3;Environmental Security;66
12.4;The Silos of Security;68
12.5;Two-Factor Authentication;70
12.6;Converging the Great Physical Divide;73
12.7;Physical Device Security (Cryptography);75
12.8;Proximity-Based Access Control;77
12.9;Summary;78
12.10;References;79
13;Chapter 5: Nonstate Sponsored Attacks: Tealing Information is OurBusiness. . . And Business is Good;81
13.1;Introduction;81
13.2;Asymmetric Forms of Information Gathering;81
13.3;Blended Reconnaissance;82
13.4;Social Engineering and Social Networking;84
13.5;Point, Click, and Own;89
13.6;Summary;95
13.7;References;95
14;Chapter 6: State-Sponsored Intelligence;97
14.1;Introduction;97
14.2;Espionage and Its Influence on Next-Generation Threats;98
14.3;Intelligence Types;107
14.4;Traditional Forms of Intelligence Gathering;112
14.5;Summary;129
15;Chapter 7: Cyber X: CriminalSyndicates, Nation States,Subnational Entities, andBeyond;131
15.1;Introduction;131
15.2;Classifying the Cyber Actor;132
15.3;Attack Sophistication Model;133
15.4;Modus Operandi;136
15.5;The Importance of Attribution;137
15.6;Criminal and Organized Syndicates;139
15.7;Nation States;143
15.8;Subnational Entities;144
15.9;Summary;147
15.10;References;148
16;Chapter 8: The Rise of the Subversive Multivector Threat;151
16.1;Introduction;151
16.2;Sun Tzu and The Art of War;151
16.3;Defining the Subversive Multivector Threat (SMT);155
16.4;Summary;166
17;Chapter 9: Seven Commonalities of Subversive Multivector Threats;169
17.1;Introduction;169
17.2;Seven Commonalities of Subversive Multivector Threats;169
17.3;Five Names in Threats You Should Know;177
17.4;Next-Generation Techniques and Tools for Avoidance and Obfuscation;189
17.5;Summary;190
17.6;References;191
18;Chapter 10: Examples of Compromise and Presence of Subversive Multivector Threats;193
18.1;Introduction;193
18.2;Black, White, and Gray: Motives and Agendas of Cyber Actors with Respect to Cybercrime and Espionage;194
18.3;Onion Routed and Anonymous Networks;202
18.4;WikiLeaks;207
18.5;Project Aurora;211
18.6;Summary;212
19;Chapter 11: Hiding In Plain Sight: Next-GenerationTechniques andTools for Avoidance andObfuscation;213
19.1;Introduction;213
19.2;Malware Quality Assurance Testing;214
19.3;IP Attribution;227
19.4;IP Spoofing;233
19.5;Summary;238
19.6;References;238
20;Chapter 12: Weapons of Our Warfare: Next-Generation Techniquesand Tools for Detection,Identification, and Analysis;239
20.1;Introduction;239
20.2;Legacy Firewalls;240
20.3;Antivirus;241
20.4;Intrusion Detection Systems and Intrusion Prevention Systems;242
20.5;What Is in a Name?;242
20.6;MOSAIC;245
20.7;Advanced Meta-Network Security Analysis;250
20.8;Next Generation Security Framework;252
20.9;Summary;261
20.10;References;261
21;Index;263



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.