Купить бумажную книгу и читать
По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".
Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.
Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.
Название: Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Авторы: Gragido W., Pirc J.
Издательство: Syngress, Elsevier
Год выпуска: 2011
Формат: PDF
Страниц: 272
ISBN-10: 1597496138
ISBN-13: 978-1597496131
Язык: Английский
Размер: 14.3 Мб
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.
Contents
Cybercrime and Espionage and the New Security 101
He Who Does Not Prevent a Crime When He Can, Encourages It
What’s Old Is New Again
A Changing World
Cybercriminal Statistics: U.S. and Abroad
The Statistics of Cybercrime
Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals
Trends in 2011
Myopic to the Catastrophic: Advanced Persistent Threats
Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and Espionage
Agendas in Next Generation Cybercriminal Activity
The Coming Decade
Evolution Revolution
Communication
Criminal Activity
The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security
Regulatory Compliance Telemetry
Transborder Data Flow Restrictions
ISO Security Standards
Health Insurance Portability and Accountability Act (HIPAA)
Family Education Rights and Privacy Act (FERPA)
Payment Card Industry Data Security Standard (PCI DSS)
North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP)
Mediating the Great Divorce: The Convergence of Physical and Logical Security
The CISSP Physical Security Domains
Environmental Security
The Silos of Security
Two-Factor Authentication
Converging the Great Physical Divide
Physical Device Security (Cryptography)
Proximity-Based Access Control
Nonstate Sponsored Attacks: Stealing Information Is Our Business. And Business Is Good
Asymmetric Forms of Information Gathering
Blended Reconnaissance
Social Engineering and Social Networking
Point, Click, and Own
State-Sponsored Intelligence
Espionage and Its Influence on Next-Generation Threats
Intelligence Types
Traditional Forms of Intelligence Gathering
Cyber X: Criminal Syndicates, Nation States, Subnational Entities, and Beyond
Classifying the Cyber Actor
Attack Sophistication Model
Modus Operandi
The Importance of Attribution
Criminal and Organized Syndicates
Nation States
Subnational Entities
The Rise of the Subversive Multivector Threat
Sun Tzu and The Art of War
Defining The Subversive Multivector Threat (SMT)
Seven Commonalities of Subversive Multivector Threats
Seven Commonalities of Subversive Multivector Threats
Five Names in Threats You Should Know
Next-Generation Techniques and Tools for Avoidance and Obfuscation
Examples of Compromise and Presence of Subversive Multivector Threats
Black, White and Gray: Motives and Agendas of Cyber Actors with Respect to Cybercrime and Espionage
Onion Routed and Anonymous Networks
WikiLeaks
Project Aurora
Hiding in Plain Sight: Next-Generation Techniques and Tools for Avoidance and Obfuscation
Malware Quality Assurance Testing
IP Attribution
IP Spoofing
Weapons of Our Warfare: Next-Generation Techniques and Tools for Detection, Identification,
and Analysis
Legacy Firewalls
Antivirus
Intrusion Detection Systems and Intrusion Prevention Systems
What Is in a Name?
MOSAIC
Advanced Meta-Network Security Analysis
Next Generation Security Framework
СКАЧАТЬ | DOWNLOAD
Купить бумажную книгу или электронную версию книги и скачать
По кнопке выше можно купить бумажные варианты этой книги и похожих книг на сайте интернет-магазина "Лабиринт".
Using the button above you can buy paper versions of this book and similar books on the website of the "Labyrinth" online store.
Реклама. ООО "ЛАБИРИНТ.РУ", ИНН: 7728644571, erid: LatgCADz8.
Дата создания страницы: