Index

A
Abuse.ch, 105
Access control, 90–91
Linux servers, 91
Microsoft Active Directory, 91
Using VLANs and, 91
Adobe Acrobat, 42
Advanced persistent threat (APT), 17, 41, 71
Advanced Research Projects Agency (ARPA), 2
After action report (AAR) of events, 47
Agent fatigue, 67
Akamai, 7
American Registry for Internet Numbers (ARIN), 41
Analyze-and-report phase., 59
Android platform, 15
Antivirus program, 15
Antivirus systems, 14
Antivirus tool, 43
Application Programming Interface (API), 100, 134
Asset discovery, 79
scans, 78
systems, 78
tools, 78
Asset management, 78
Attack chain, 41, 42
actual exploitation, 42
HTTP and the C&C protocol, 43
installation, 43
reconnaissance, 41, 42
Attack, flowchart ...

Get Building an Intelligence-Led Security Program now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.