Index

A
Abuse.ch, 105
Access control, 90–91
Linux servers, 91
Microsoft Active Directory, 91
Using VLANs and, 91
Adobe Acrobat, 42
Advanced persistent threat (APT), 17, 41, 71
Advanced Research Projects Agency (ARPA), 2
After action report (AAR) of events, 47
Agent fatigue, 67
Akamai, 7
American Registry for Internet Numbers (ARIN), 41
Analyze-and-report phase., 59
Android platform, 15
Antivirus program, 15
Antivirus systems, 14
Antivirus tool, 43
Application Programming Interface (API), 100, 134
Asset discovery, 79
scans, 78
systems, 78
tools, 78
Asset management, 78
Attack chain, 41, 42
actual exploitation, 42
HTTP and the C&C protocol, 43
installation, 43
reconnaissance, 41, 42
Attack, flowchart ...

Get Building an Intelligence-Led Security Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.