UID:
almahu_9948025962002882
Format:
1 online resource (356 p.)
Edition:
1st ed.
ISBN:
1-281-05588-3
,
9786611055882
,
0-08-047699-6
Content:
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lea
Note:
Includes index.
,
Cover; Acknowledgments; Author; Contributors; Special Contribution; Preface; Contents; Chapter 1 Introduction; Cyber Adversary Characterization; Cyber Terrorist: A Media Buzzword?; Failures of Existing Models; Introduction to Characterization Theory; Chapter 2 Theoretical Characterization Metrics; Introduction; The Adversary Object Matrix; Adversary Property Relationships; The Adversary Model-"Adversary Environment Properties"; The Adversary Model-"Attacker Properties"; Summary; Chapter 3 Disclosure and the Cyber Food Chain; Introduction; Vulnerability Disclosure and the Cyber Adversary
,
Disclosure Attack Capability and ConsiderationsThe Vulnerability Disclosure Pyramid Metric; The Disclosure Food Chain; Summary; Chapter 4 Rating the Attack: Post-Incident Characterization Metrics; Introduction:Theoretical Crossover and the Attack Point Scoring Systems; The Source of the Problem; Variables of Attack Tools to Consider; Common Types of Attack Tools; Caveats of Attack Tool Metrics; Attack Technique Variables; Common Types of Attack Techniques; Caveats: Attack Behavior Masquerading; Summary; Chapter 5 Asset Threat Characterization; Introduction
,
Target Properties: Attack Driver and Inhibitor InfluenceThe Asset Threat Characterization; Fictional Asset Threat Characterization Case Study; Summary; Chapter 6 Bringing It All Together: Completing the Cyber Adversary Model; Introduction; Intermetric Component Relationships; Summary; Chapter 7 WarmTouch: Assessing the Insider Threat and Relationship Management; Introduction; The Challenges of Detecting the Insider Threat; Case Illustrations; Summary; References; Footnote; Chapter 8 Managing the Insider Threat; Introduction: Setting the Stage; Prevention; Detection; Insider Case Management
,
Chapter 12 Return on InvestmentPlaying the Market; Information Leakage at the Packet Level; Corrupted by Greed; Revenge of the Nerd; A Lead from Las Vegas; The Call of Opportunity; Initial Reconnaissance; Shrax:The Ultimate Rootkit; Throwaway Account; Seeking the Prize; Hacking .MIL; Triumph and New Toys; Endnotes; Aftermath...The Investigation Continues; Final Words; Acknowledgements; Glossary; Index
,
English
Additional Edition:
ISBN 1-931836-11-6
Language:
English
Bookmarklink