Reverse Deception: Organized Cyber Threat Counter-Exploitation
- Length: 464 pages
- Edition: 1
- Language: English
- Publisher: McGraw-Hill Osborne Media
- Publication Date: 2012-07-03
- ISBN-10: 0071772499
- ISBN-13: 9780071772495
- Sales Rank: #790095 (See Top 100 Books)
In-depth counterintelligence tactics to fight cyber-espionage
“A comprehensive and unparalleled overview of the topic by experts in the field.”–Slashdot
Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.
- Establish the goals and scope of your reverse deception campaign
- Identify, analyze, and block APTs
- Engage and catch nefarious individuals and their organizations
- Assemble cyber-profiles, incident analyses, and intelligence reports
- Uncover, eliminate, and autopsy crimeware, trojans, and botnets
- Work with intrusion detection, anti-virus, and digital forensics tools
- Employ stealth honeynet, honeypot, and sandbox technologies
- Communicate and collaborate with legal teams and law enforcement
Table of Contents
Chapter 1 State of the Advanced Cyber Threat
Chapter 2 What Is Deception?
Chapter 3 Cyber Counterintelligence
Chapter 4 Profiling Fundamentals
Chapter 5 Actionable Legal Knowledge for the Security Professional
Chapter 6 Threat (Attacker) Tradecraft
Chapter 7 Operational Deception
Chapter 8 Tools and Tactics
Chapter 9 Attack Characterization Techniques
Chapter 10 Attack Attribution
Chapter 11 The Value of APTs
Chapter 12 When and When Not to Act
Chapter 13 Implementation and Validation