Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Купить бумажную книгу и читать

Купить бумажную книгу

По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".

Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.

Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.

Название: Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Авторы: Gragido W., Pirc J.

Издательство: Syngress, Elsevier

Год выпуска: 2011

Формат: PDF

Страниц: 272

ISBN-10: 1597496138

ISBN-13: 978-1597496131

Язык: Английский

Размер: 14.3 Мб

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.

Contents

Cybercrime and Espionage and the New Security 101

He Who Does Not Prevent a Crime When He Can, Encourages It

What’s Old Is New Again

A Changing World

Cybercriminal Statistics: U.S. and Abroad

The Statistics of Cybercrime

Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals

Trends in 2011

Myopic to the Catastrophic: Advanced Persistent Threats

Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and Espionage

Agendas in Next Generation Cybercriminal Activity

The Coming Decade

Evolution Revolution

Communication

Criminal Activity

The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security

Regulatory Compliance Telemetry

Transborder Data Flow Restrictions

ISO Security Standards

Health Insurance Portability and Accountability Act (HIPAA)

Family Education Rights and Privacy Act (FERPA)

Payment Card Industry Data Security Standard (PCI DSS)

North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP)

Mediating the Great Divorce: The Convergence of Physical and Logical Security

The CISSP Physical Security Domains

Environmental Security

The Silos of Security

Two-Factor Authentication

Converging the Great Physical Divide

Physical Device Security (Cryptography)

Proximity-Based Access Control

Nonstate Sponsored Attacks: Stealing Information Is Our Business. And Business Is Good

Asymmetric Forms of Information Gathering

Blended Reconnaissance

Social Engineering and Social Networking

Point, Click, and Own

State-Sponsored Intelligence

Espionage and Its Influence on Next-Generation Threats

Intelligence Types

Traditional Forms of Intelligence Gathering

Cyber X: Criminal Syndicates, Nation States, Subnational Entities, and Beyond

Classifying the Cyber Actor

Attack Sophistication Model

Modus Operandi

The Importance of Attribution

Criminal and Organized Syndicates

Nation States

Subnational Entities

The Rise of the Subversive Multivector Threat

Sun Tzu and The Art of War

Defining The Subversive Multivector Threat (SMT)

Seven Commonalities of Subversive Multivector Threats

Seven Commonalities of Subversive Multivector Threats

Five Names in Threats You Should Know

Next-Generation Techniques and Tools for Avoidance and Obfuscation

Examples of Compromise and Presence of Subversive Multivector Threats

Black, White and Gray: Motives and Agendas of Cyber Actors with Respect to Cybercrime and Espionage

Onion Routed and Anonymous Networks

WikiLeaks

Project Aurora

Hiding in Plain Sight: Next-Generation Techniques and Tools for Avoidance and Obfuscation

Malware Quality Assurance Testing

IP Attribution

IP Spoofing

Weapons of Our Warfare: Next-Generation Techniques and Tools for Detection, Identification,

and Analysis

Legacy Firewalls

Antivirus

Intrusion Detection Systems and Intrusion Prevention Systems

What Is in a Name?

MOSAIC

Advanced Meta-Network Security Analysis

Next Generation Security Framework

СКАЧАТЬ | DOWNLOAD

Дата создания страницы: