Cyber Adversary Characterization : Auditing the Hacker Mind.

By: Parker, TomContributor(s): Sachs, Marcus | Shaw, Eric | Stroz, EdPublisher: Rockland : Elsevier Science & Technology Books, 2004Copyright date: ©2004Edition: 1st edDescription: 1 online resource (356 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780080476995Subject(s): Computer security.;Computer networks -- Security measuresGenre/Form: Electronic books. Additional physical formats: Print version:: Cyber Adversary Characterization : Auditing the Hacker MindDDC classification: 005.8 LOC classification: QA76.9.A25 -- C93 2004ebOnline resources: Click to View
Contents:
Cover -- Acknowledgments -- Author -- Contributors -- Special Contribution -- Preface -- Contents -- Chapter 1 Introduction -- Cyber Adversary Characterization -- Cyber Terrorist: A Media Buzzword? -- Failures of Existing Models -- Introduction to Characterization Theory -- Chapter 2 Theoretical Characterization Metrics -- Introduction -- The Adversary Object Matrix -- Adversary Property Relationships -- The Adversary Model-"Adversary Environment Properties" -- The Adversary Model-"Attacker Properties" -- Summary -- Chapter 3 Disclosure and the Cyber Food Chain -- Introduction -- Vulnerability Disclosure and the Cyber Adversary -- Disclosure Attack Capability and Considerations -- The Vulnerability Disclosure Pyramid Metric -- The Disclosure Food Chain -- Summary -- Chapter 4 Rating the Attack: Post-Incident Characterization Metrics -- Introduction:Theoretical Crossover and the Attack Point Scoring Systems -- The Source of the Problem -- Variables of Attack Tools to Consider -- Common Types of Attack Tools -- Caveats of Attack Tool Metrics -- Attack Technique Variables -- Common Types of Attack Techniques -- Caveats: Attack Behavior Masquerading -- Summary -- Chapter 5 Asset Threat Characterization -- Introduction -- Target Properties: Attack Driver and Inhibitor Influence -- The Asset Threat Characterization -- Fictional Asset Threat Characterization Case Study -- Summary -- Chapter 6 Bringing It All Together: Completing the Cyber Adversary Model -- Introduction -- Intermetric Component Relationships -- Summary -- Chapter 7 WarmTouch: Assessing the Insider Threat and Relationship Management -- Introduction -- The Challenges of Detecting the Insider Threat -- Case Illustrations -- Summary -- References -- Footnote -- Chapter 8 Managing the Insider Threat -- Introduction: Setting the Stage -- Prevention -- Detection -- Insider Case Management.
Summary -- References -- Chapter 9 The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures -- Introduction -- Historical Context -- Increasing Threats and Vulnerabilities -- Identifying and Characterizing the Cyber Threat -- Summary -- Chapter 10 Characterizing the Extremes„Terrorists and Nation States -- Introduction -- The Nation State Cyber Adversary -- International Terrorists and Rogue Nations -- Physical Insider Placement -- Summary -- Footnotes and References -- Chapter 11 Conclusions -- A Look Back -- Kevin D. Mitnick: Attack, Weighed and Measured! -- Summary -- And Now for Something a Little Different! -- Chapter 12 Return on Investment -- Playing the Market -- Information Leakage at the Packet Level -- Corrupted by Greed -- Revenge of the Nerd -- A Lead from Las Vegas -- The Call of Opportunity -- Initial Reconnaissance -- Shrax:The Ultimate Rootkit -- Throwaway Account -- Seeking the Prize -- Hacking .MIL -- Triumph and New Toys -- Endnotes -- Aftermath…The Investigation Continues -- Final Words -- Acknowledgements -- Glossary -- Index.
Summary: The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF00016910
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP00016910
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Cover -- Acknowledgments -- Author -- Contributors -- Special Contribution -- Preface -- Contents -- Chapter 1 Introduction -- Cyber Adversary Characterization -- Cyber Terrorist: A Media Buzzword? -- Failures of Existing Models -- Introduction to Characterization Theory -- Chapter 2 Theoretical Characterization Metrics -- Introduction -- The Adversary Object Matrix -- Adversary Property Relationships -- The Adversary Model-"Adversary Environment Properties" -- The Adversary Model-"Attacker Properties" -- Summary -- Chapter 3 Disclosure and the Cyber Food Chain -- Introduction -- Vulnerability Disclosure and the Cyber Adversary -- Disclosure Attack Capability and Considerations -- The Vulnerability Disclosure Pyramid Metric -- The Disclosure Food Chain -- Summary -- Chapter 4 Rating the Attack: Post-Incident Characterization Metrics -- Introduction:Theoretical Crossover and the Attack Point Scoring Systems -- The Source of the Problem -- Variables of Attack Tools to Consider -- Common Types of Attack Tools -- Caveats of Attack Tool Metrics -- Attack Technique Variables -- Common Types of Attack Techniques -- Caveats: Attack Behavior Masquerading -- Summary -- Chapter 5 Asset Threat Characterization -- Introduction -- Target Properties: Attack Driver and Inhibitor Influence -- The Asset Threat Characterization -- Fictional Asset Threat Characterization Case Study -- Summary -- Chapter 6 Bringing It All Together: Completing the Cyber Adversary Model -- Introduction -- Intermetric Component Relationships -- Summary -- Chapter 7 WarmTouch: Assessing the Insider Threat and Relationship Management -- Introduction -- The Challenges of Detecting the Insider Threat -- Case Illustrations -- Summary -- References -- Footnote -- Chapter 8 Managing the Insider Threat -- Introduction: Setting the Stage -- Prevention -- Detection -- Insider Case Management.

Summary -- References -- Chapter 9 The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures -- Introduction -- Historical Context -- Increasing Threats and Vulnerabilities -- Identifying and Characterizing the Cyber Threat -- Summary -- Chapter 10 Characterizing the Extremes„Terrorists and Nation States -- Introduction -- The Nation State Cyber Adversary -- International Terrorists and Rogue Nations -- Physical Insider Placement -- Summary -- Footnotes and References -- Chapter 11 Conclusions -- A Look Back -- Kevin D. Mitnick: Attack, Weighed and Measured! -- Summary -- And Now for Something a Little Different! -- Chapter 12 Return on Investment -- Playing the Market -- Information Leakage at the Packet Level -- Corrupted by Greed -- Revenge of the Nerd -- A Lead from Las Vegas -- The Call of Opportunity -- Initial Reconnaissance -- Shrax:The Ultimate Rootkit -- Throwaway Account -- Seeking the Prize -- Hacking .MIL -- Triumph and New Toys -- Endnotes -- Aftermath…The Investigation Continues -- Final Words -- Acknowledgements -- Glossary -- Index.

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.