Cyber Adversary Characterization: Auditing the Hacker Mind

Paperback
from $0.00

Author: Tom Parker

ISBN-10: 1931836116

ISBN-13: 9781931836111

Category: Security - Computer Networks

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage...

Search in google:

Intended for system administrators, this book provides a set of threat characterization metrics to measure a potential cyber adversary's core properties and determine how such a hacker would behave in a defined situation or against a specific asset. Addressing both internal and external attacks, the authors discuss what can be learned from the tools a hacker uses, how a system's location, owner, and software influence the hacker's risk assessment, and the intentions and capabilities of nation states and terrorists who may wage computer attacks. Annotation ©2004 Book News, Inc., Portland, OR

Foreword by Jeff Moss Chapter 1: Introduction Chapter 2: Theoretical Characterization Metrics Chapter 3: Disclosure and the Cyber Food Chain Chapter 4: Rating the Attack: Post-Incident Characterization Metrics Chapter 5: Asset Threat Characterization Chapter 6: Bringing It All Together: Completing the Cyber Adversary Model Chapter 7: WarmTouch: Assessing the Insider Threat and Relationship Management Chapter 8: Managing the Insider Threat Chapter 9: The Cyber Adversary in Groups: Targeting Nations Critical Infrastructures Chapter 10: Characterizing the Extremes-Terrorists and Nation States Chapter 11: Conclusions Chapter 12: Return on Investment Glossary