Cyber Adversary Characterization -  Tom Parker,  Marcus Sachs,  Eric Shaw,  Ed Stroz

Cyber Adversary Characterization (eBook)

Auditing the Hacker Mind
eBook Download: PDF
2004 | 1. Auflage
512 Seiten
Elsevier Science (Verlag)
978-0-08-047699-5 (ISBN)
Systemvoraussetzungen
40,57 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? Inside the Mind of a Criminal Hacker sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly know thy enemy in order to prepare the best defense.

* . The breadth of material in Inside the Criminal Mind will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "e;Inside the Mind of a Criminal Hacker"e; sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "e;know thy enemy"e; in order to prepare the best defense.* . The breadth of material in "e;Inside the Criminal Mind"e; will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.

Cover 1
Acknowledgments 6
Author 6
Contributors 8
Special Contribution 12
Preface 13
Contents 17
Chapter 1 Introduction 31
Cyber Adversary Characterization 32
Cyber Terrorist: A Media Buzzword? 38
Failures of Existing Models 42
Introduction to Characterization Theory 47
Chapter 2 Theoretical Characterization Metrics 49
Introduction 50
The Adversary Object Matrix 51
Adversary Property Relationships 53
The Adversary Model—“Adversary Environment Properties” 55
The Adversary Model—“Attacker Properties” 67
Summary 78
Chapter 3 Disclosure and the Cyber Food Chain 79
Introduction 80
Vulnerability Disclosure and the Cyber Adversary 80
Disclosure Attack Capability and Considerations 83
The Vulnerability Disclosure Pyramid Metric 96
The Disclosure Food Chain 102
Summary 106
Chapter 4 Rating the Attack: Post-Incident Characterization Metrics 107
Introduction:Theoretical Crossover and the Attack Point Scoring Systems 108
The Source of the Problem 108
Variables of Attack Tools to Consider 110
Common Types of Attack Tools 114
Caveats of Attack Tool Metrics 121
Attack Technique Variables 122
Common Types of Attack Techniques 125
Caveats: Attack Behavior Masquerading 134
Summary 135
Chapter 5 Asset Threat Characterization 137
Introduction 138
Target Properties: Attack Driver and Inhibitor Influence 141
The Asset Threat Characterization 146
Fictional Asset Threat Characterization Case Study 152
Summary 166
Chapter 6 Bringing It All Together: Completing the Cyber Adversary Model 167
Introduction 168
Intermetric Component Relationships 168
Summary 173
Chapter 7 WarmTouch: Assessing the Insider Threat and Relationship Management 175
Introduction 176
The Challenges of Detecting the Insider Threat 176
Case Illustrations 179
Summary 198
References 199
Footnote 200
Chapter 8 Managing the Insider Threat 201
Introduction: Setting the Stage 202
Prevention 206
Detection 214
Insider Case Management 229
Summary 233
References 233
Chapter 9 The Cyber Adversary in Groups: Targeting Nations’ Critical Infrastructures 235
Introduction 236
Historical Context 238
Increasing Threats and Vulnerabilities 240
Identifying and Characterizing the Cyber Threat 250
Summary 258
Chapter 10 Characterizing the Extremes„Terrorists and Nation States 261
Introduction 262
The Nation State Cyber Adversary 262
International Terrorists and Rogue Nations 271
Physical Insider Placement 283
Summary 289
Footnotes and References 290
Chapter 11 Conclusions 293
A Look Back 294
Kevin D. Mitnick: Attack, Weighed and Measured! 294
Summary 300
And Now for Something a Little Different! 300
Chapter 12 Return on Investment 301
Playing the Market 303
Information Leakage at the Packet Level 304
Corrupted by Greed 307
Revenge of the Nerd 308
A Lead from Las Vegas 310
The Call of Opportunity 311
Initial Reconnaissance 312
Shrax:The Ultimate Rootkit 314
Throwaway Account 318
Seeking the Prize 323
Hacking .MIL 328
Triumph and New Toys 332
Endnotes 333
Aftermath…The Investigation Continues 334
Final Words 339
Acknowledgements 340
Glossary 341
Index 343

Erscheint lt. Verlag 9.7.2004
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management
ISBN-10 0-08-047699-6 / 0080476996
ISBN-13 978-0-08-047699-5 / 9780080476995
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99