Book description
A groundbreaking exploration of how to identify and fight security threats at every level
This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures.
Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the future
Illustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing security
Covers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats
CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis
Predicting Malicious Behavior fuses the behavioral and computer sciences to enlighten anyone concerned with security and to aid professionals in keeping our world safer.
Table of contents
- Cover
-
Part I: Understanding the Dark Side: Malicious Intent
- Chapter 1: Analyzing the Malicious Individual
- Chapter 2: Analyzing the Malicious Group
- Chapter 3: Analyzing Country-Level Threats
- Chapter 4: Threats and Security Nightmares: Our Current Reactive State of Security
-
Chapter 5: Current Network Security
- Hacking and National Network Security
- Growing Damage and Threat
- Assessing Current Technology
- Moving Toward Fixing Current Ineffective Network Protection
- Envisioning an Effective Future Network Protection Technology
- Advantages of AuBA #5: Conducting a Human Behavior Assessment of Threats from Network Packets
- In Summary
- Chapter 6: Future Threats to Our National Security
-
Part II: Dissecting Malicious Behavior
-
Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
- Using a Behavior Analysis Methodology That Works
- Using Behavior Principles to Analyze Behavior
- Environmental Variables
- Different Environments, Different Antecedents
- Antecedents, Behavior, and Consequences
- Behavior Modeling
- Advantages of AuBA #7: Incorporating, Refining, and Expanding Behavior Principles for Global Security
- In Summary
- Chapter 8: Applying Behavior Principles: Predicting Group Malicious Behavior
- Chapter 9: Applying a Predictive Methodology: From Principles to Practice
- Chapter 10: Predicting Domestic Threat
- Chapter 11: Computer Networks: Protection from External Threat
- Chapter 12: Computer Networks: Protection from Internal Threat
-
Chapter 13: Predicting Global Threat
- Understanding State-Sponsored Threat
- Describing and Identifying Future Global Threat
- Understanding the Role of Network Forensics
- Determining State Support of Terrorist Activities
- Moving from Detection to Protection: A Major Leap
- Advantages of AuBA #13: The AuBA Behaviorprint and How It Compares to Signatures
- In Summary
-
Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
- Part III: Applying Tools and Methods
- Part IV: Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security
- Foreword
- Introduction
- Download CD/DVD content
Product information
- Title: Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
- Author(s):
- Release date: June 2012
- Publisher(s): Wiley
- ISBN: 9781118166130
You might also like
book
Detecting and Combating Malicious Email
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, …
book
How to Defeat Advanced Malware
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book …
book
Advanced Persistent Security
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, …
book
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical …