Suchen und Finden
Service
Cyber Adversary Characterization - Auditing the Hacker Mind
Tom Parker, Marcus Sachs, Eric Shaw
Verlag Elsevier Reference Monographs, 2004
ISBN 9780080476995 , 512 Seiten
Format PDF
Kopierschutz DRM
Geräte
Cover
1
Acknowledgments
6
Author
6
Contributors
8
Special Contribution
12
Preface
13
Contents
17
Chapter 1 Introduction
31
Cyber Adversary Characterization
32
Cyber Terrorist: A Media Buzzword?
38
Failures of Existing Models
42
Introduction to Characterization Theory
47
Chapter 2 Theoretical Characterization Metrics
49
Introduction
50
The Adversary Object Matrix
51
Adversary Property Relationships
53
The Adversary Model—“Adversary Environment Properties”
55
The Adversary Model—“Attacker Properties”
67
Summary
78
Chapter 3 Disclosure and the Cyber Food Chain
79
Introduction
80
Vulnerability Disclosure and the Cyber Adversary
80
Disclosure Attack Capability and Considerations
83
The Vulnerability Disclosure Pyramid Metric
96
The Disclosure Food Chain
102
Summary
106
Chapter 4 Rating the Attack: Post-Incident Characterization Metrics
107
Introduction:Theoretical Crossover and the Attack Point Scoring Systems
108
The Source of the Problem
108
Variables of Attack Tools to Consider
110
Common Types of Attack Tools
114
Caveats of Attack Tool Metrics
121
Attack Technique Variables
122
Common Types of Attack Techniques
125
Caveats: Attack Behavior Masquerading
134
Summary
135
Chapter 5 Asset Threat Characterization
137
Introduction
138
Target Properties: Attack Driver and Inhibitor Influence
141
The Asset Threat Characterization
146
Fictional Asset Threat Characterization Case Study
152
Summary
166
Chapter 6 Bringing It All Together: Completing the Cyber Adversary Model
167
Introduction
168
Intermetric Component Relationships
168
Summary
173
Chapter 7 WarmTouch: Assessing the Insider Threat and Relationship Management
175
Introduction
176
The Challenges of Detecting the Insider Threat
176
Case Illustrations
179
Summary
198
References
199
Footnote
200
Chapter 8 Managing the Insider Threat
201
Introduction: Setting the Stage
202
Prevention
206
Detection
214
Insider Case Management
229
Summary
233
References
233
Chapter 9 The Cyber Adversary in Groups: Targeting Nations’ Critical Infrastructures
235
Introduction
236
Historical Context
238
Increasing Threats and Vulnerabilities
240
Identifying and Characterizing the Cyber Threat
250
Summary
258
Chapter 10 Characterizing the Extremes„Terrorists and Nation States
261
Introduction
262
The Nation State Cyber Adversary
262
International Terrorists and Rogue Nations
271
Physical Insider Placement
283
Summary
289
Footnotes and References
290
Chapter 11 Conclusions
293
A Look Back
294
Kevin D. Mitnick: Attack, Weighed and Measured!
294
Summary
300
And Now for Something a Little Different!
300
Chapter 12 Return on Investment
301
Playing the Market
303
Information Leakage at the Packet Level
304
Corrupted by Greed
307
Revenge of the Nerd
308
A Lead from Las Vegas
310
The Call of Opportunity
311
Initial Reconnaissance
312
Shrax:The Ultimate Rootkit
314
Throwaway Account
318
Seeking the Prize
323
Hacking .MIL
328
Triumph and New Toys
332
Endnotes
333
Aftermath…The Investigation Continues
334
Final Words
339
Acknowledgements
340
Glossary
341
Index
343
Service
Shop