dummies
 

Suchen und Finden

Titel

Autor/Verlag

Inhaltsverzeichnis

Nur ebooks mit Firmenlizenz anzeigen:

 

Cyber Adversary Characterization - Auditing the Hacker Mind

Tom Parker, Marcus Sachs, Eric Shaw

 

Verlag Elsevier Reference Monographs, 2004

ISBN 9780080476995 , 512 Seiten

Format PDF

Kopierschutz DRM

Geräte

39,95 EUR


 

Cover

1

Acknowledgments

6

Author

6

Contributors

8

Special Contribution

12

Preface

13

Contents

17

Chapter 1 Introduction

31

Cyber Adversary Characterization

32

Cyber Terrorist: A Media Buzzword?

38

Failures of Existing Models

42

Introduction to Characterization Theory

47

Chapter 2 Theoretical Characterization Metrics

49

Introduction

50

The Adversary Object Matrix

51

Adversary Property Relationships

53

The Adversary Model—“Adversary Environment Properties”

55

The Adversary Model—“Attacker Properties”

67

Summary

78

Chapter 3 Disclosure and the Cyber Food Chain

79

Introduction

80

Vulnerability Disclosure and the Cyber Adversary

80

Disclosure Attack Capability and Considerations

83

The Vulnerability Disclosure Pyramid Metric

96

The Disclosure Food Chain

102

Summary

106

Chapter 4 Rating the Attack: Post-Incident Characterization Metrics

107

Introduction:Theoretical Crossover and the Attack Point Scoring Systems

108

The Source of the Problem

108

Variables of Attack Tools to Consider

110

Common Types of Attack Tools

114

Caveats of Attack Tool Metrics

121

Attack Technique Variables

122

Common Types of Attack Techniques

125

Caveats: Attack Behavior Masquerading

134

Summary

135

Chapter 5 Asset Threat Characterization

137

Introduction

138

Target Properties: Attack Driver and Inhibitor Influence

141

The Asset Threat Characterization

146

Fictional Asset Threat Characterization Case Study

152

Summary

166

Chapter 6 Bringing It All Together: Completing the Cyber Adversary Model

167

Introduction

168

Intermetric Component Relationships

168

Summary

173

Chapter 7 WarmTouch: Assessing the Insider Threat and Relationship Management

175

Introduction

176

The Challenges of Detecting the Insider Threat

176

Case Illustrations

179

Summary

198

References

199

Footnote

200

Chapter 8 Managing the Insider Threat

201

Introduction: Setting the Stage

202

Prevention

206

Detection

214

Insider Case Management

229

Summary

233

References

233

Chapter 9 The Cyber Adversary in Groups: Targeting Nations’ Critical Infrastructures

235

Introduction

236

Historical Context

238

Increasing Threats and Vulnerabilities

240

Identifying and Characterizing the Cyber Threat

250

Summary

258

Chapter 10 Characterizing the Extremes„Terrorists and Nation States

261

Introduction

262

The Nation State Cyber Adversary

262

International Terrorists and Rogue Nations

271

Physical Insider Placement

283

Summary

289

Footnotes and References

290

Chapter 11 Conclusions

293

A Look Back

294

Kevin D. Mitnick: Attack, Weighed and Measured!

294

Summary

300

And Now for Something a Little Different!

300

Chapter 12 Return on Investment

301

Playing the Market

303

Information Leakage at the Packet Level

304

Corrupted by Greed

307

Revenge of the Nerd

308

A Lead from Las Vegas

310

The Call of Opportunity

311

Initial Reconnaissance

312

Shrax:The Ultimate Rootkit

314

Throwaway Account

318

Seeking the Prize

323

Hacking .MIL

328

Triumph and New Toys

332

Endnotes

333

Aftermath…The Investigation Continues

334

Final Words

339

Acknowledgements

340

Glossary

341

Index

343