Reverse deception : organized cyber threat counter-exploitation / Max Kilger, Jade Jones, Sean Bodmer and Gregory Carpenter.

By: Bodmer, Sean [author]Contributor(s): Kilger, Max [co-author] | Carpenter, Gregory [co-author] | Jones, Jade [co-author]Material type: TextTextPublication details: New York : McGraw-Hill, c2012Description: xlvi, 418 pages : illustrations ; 24 cmISBN: 9780071772495Subject(s): INFORMATION TECHNOLOGY -- SECURITY MEASURES | COMPUTER SECURITY -- MANAGEMENT | COMPUTER NETWORKS -- SECURITY MEASURESLOC classification: TK 5105.59 .R48 2012
Contents:
Ch 1. Introduction -- Ch 2. Deception Throughout History to Today -- Ch 3. The Applications & Goals of Cyber Counterintelligence -- Ch 4. The Missions and Outcomes of Criminal Profiling -- Ch 5. Legal & Ethical Aspects of Deception -- Ch 6. Attack Tradecraft -- Ch 7. Operational Deception -- Ch 8. Tools, Tactics & Procedures -- Ch 9. Attack Attribution -- Ch 10. Black Hat Motivators -- Ch 11. Understanding Advanced Persistent Threats -- Ch 12. When To & When Not To Act -- Ch 13. Implementation & Validation
Summary: In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Home library Collection Shelving location Call number Copy number Status Date due Barcode
Books Books LRC - Main
National University - Manila
Digital Forensic General Circulation GC TK 5105.59 .R48 2012 c.1 (Browse shelf (Opens below)) c.1 Available NULIB000008293
Books Books LRC - Main
National University - Manila
Digital Forensic General Circulation GC TK 5105.59 .R48 2012 c.2 (Browse shelf (Opens below)) c.2 Available NULIB000008363

Includes index.

Ch 1. Introduction --
Ch 2. Deception Throughout History to Today --
Ch 3. The Applications & Goals of Cyber Counterintelligence --
Ch 4. The Missions and Outcomes of Criminal Profiling --
Ch 5. Legal & Ethical Aspects of Deception --
Ch 6. Attack Tradecraft --
Ch 7. Operational Deception --
Ch 8. Tools, Tactics & Procedures --
Ch 9. Attack Attribution --
Ch 10. Black Hat Motivators --
Ch 11. Understanding Advanced Persistent Threats --
Ch 12. When To & When Not To Act --
Ch 13. Implementation & Validation

In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement.

There are no comments on this title.

to post a comment.

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA