Cyber Adversary Characterization: Auditing the Hacker Mind
暫譯: 網路對手特徵分析:駭客思維的審計

Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz, Matthew G. Devost

  • 出版商: Syngress Media
  • 售價: $2,220
  • 貴賓價: 9.5$2,109
  • 語言: 英文
  • 頁數: 356
  • 裝訂: Paperback
  • ISBN: 1931836116
  • ISBN-13: 9781931836111
  • 相關分類: 駭客 Hack
  • 海外代購書籍(需單獨結帳)

商品描述

Description:

Develop a Well-Measured Defense Against Cybercriminals
When we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That’s lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.-from the preface by Richard Thieme

  • Kevin Mitnick Exposed
    The infamous hacker Kevin D. Mitnick allows himself and one of his more significant hacks to be weighed and measured.
  • Cyber Terrorist: Just a Media Buzzword?
    Learn how the second we become narrow-minded about the security of our organizations and the resolve of our cyber enemy is the second we become vulnerable to some of the worlds most dangerous minds.
  • Understand Adversary Models
    Can you answer the same questions your adversary will be asking, such as “If I were to attack this target, what effort will be made to identify me, if my attack is detected?”
  • Characterize Specific Threats
    Identify where the real threats to your most critical assets lay and learn to answer the question of why you believe those threats are so real.
  • Manage the Insider Threat
    See how the key to early insider threat detection is in understanding how disgruntled employees move down the critical pathway towards an attack
  • Characterize the Extremes-Terrorists and Nation States
    See why the authors believe that the concept of cyber terrorism should be viewed as a very real and critical emerging threat.
  • Monitor a Cyber Stalker
    Learn how software concepts such as “WarmTouch” can help restore the psychological insights lost through traditional, technology driven insider detection techniques.
  • Case Studies Offer Insight and Lessons
    See how characterization theory can be used to analyze some of histories more memorable incidents with 20/20 vision.

 

商品描述(中文翻譯)

描述:
開發一個有效的防禦以對抗網路犯罪分子
當我們談論駭客的心態時,我們指的是那些因各種隱秘目的而驅動的惡棍的心態。我們指的是那些下載他人編寫的腳本並一鍵執行的腳本小子,我們指的是衝動控制有限的破壞者,我們指的是數據竊賊,還有那些利用這些數據進行勒索、企業或工業間諜、國家級間諜活動、身份盜竊、重大盜竊、敲詐、惡意報復或恐怖活動的人。這是許多種心態,需要被理解、需要被分析、需要被滲透、需要被徹底了解。——摘自 Richard Thieme 的前言

- Kevin Mitnick 的揭露
臭名昭著的駭客 Kevin D. Mitnick 讓自己和他的一個重要駭客行為被評估和衡量。
- 網路恐怖分子:僅僅是一個媒體流行詞?
了解當我們對組織的安全性和網路敵人的決心變得狹隘時,我們就會變得脆弱,面對世界上最危險的心態。
- 理解對手模型
你能回答你的對手會問的問題嗎,例如「如果我攻擊這個目標,將會付出什麼努力來識別我,如果我的攻擊被檢測到?」
- 特定威脅的特徵
識別對你最關鍵資產的真正威脅所在,並學會回答為什麼你認為這些威脅如此真實的問題。
- 管理內部威脅
了解早期識別內部威脅的關鍵在於理解不滿的員工如何沿著攻擊的關鍵路徑行進。
- 特徵化極端情況——恐怖分子和國家
了解為什麼作者認為網路恐怖主義的概念應被視為一個非常真實且關鍵的新興威脅。
- 監控網路跟蹤者
了解像「WarmTouch」這樣的軟體概念如何幫助恢復通過傳統技術驅動的內部檢測技術所失去的心理洞察。
- 案例研究提供見解和教訓
了解如何利用特徵化理論來分析一些歷史上更具紀念性的事件,並以清晰的視角進行分析。

最後瀏覽商品 (20)