Client-Side Attacks and Defense
- Length: 296 pages
- Edition: 1
- Language: English
- Publisher: Syngress
- Publication Date: 2012-10-24
- ISBN-10: 1597495905
- ISBN-13: 9781597495905
- Sales Rank: #4674285 (See Top 100 Books)
Individuals wishing to attack a company’s network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user’s machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible.
The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education.
- Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
- Learn how to strengthen your network’s host- and network-based defense against attackers’ number one remote exploit-the client-side attack
- Defend your network against attacks that target your company’s most vulnerable asset-the end user
Most Helpful Customer Reviews
This book is timely and relevent for today’s novice to intermediate system administrators. The authors take the time to explain client-side attacks in pain staking detail. It answers the question “What is it?” and “How do they do that?”. They go through explaining why web browsers are inherently poor in protecting the user and why “active content” is not your friend. It goes through not only protecting Microsoft Internet Explorer but other commonly used browsers like Firefox, Chrome and Safari. The book is current and not only takes into account desktops and laptops, but understands the workforce is made up of BYOD (bring your own device) and these are just as open to attacks.
There is a war going on in cyberspace and the work place. This book gives you both your enemies game plan and the ammunition that you need to defend your environment.