Book description
A groundbreaking exploration of how to identify and fight security threats at every level
This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures.
Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the future
Illustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing security
Covers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats
CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis
Predicting Malicious Behavior fuses the behavioral and computer sciences to enlighten anyone concerned with security and to aid professionals in keeping our world safer.
Table of contents
- Cover
-
Part I: Understanding the Dark Side: Malicious Intent
- Chapter 1: Analyzing the Malicious Individual
- Chapter 2: Analyzing the Malicious Group
- Chapter 3: Analyzing Country-Level Threats
- Chapter 4: Threats and Security Nightmares: Our Current Reactive State of Security
-
Chapter 5: Current Network Security
- Hacking and National Network Security
- Growing Damage and Threat
- Assessing Current Technology
- Moving Toward Fixing Current Ineffective Network Protection
- Envisioning an Effective Future Network Protection Technology
- Advantages of AuBA #5: Conducting a Human Behavior Assessment of Threats from Network Packets
- In Summary
- Chapter 6: Future Threats to Our National Security
-
Part II: Dissecting Malicious Behavior
-
Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
- Using a Behavior Analysis Methodology That Works
- Using Behavior Principles to Analyze Behavior
- Environmental Variables
- Different Environments, Different Antecedents
- Antecedents, Behavior, and Consequences
- Behavior Modeling
- Advantages of AuBA #7: Incorporating, Refining, and Expanding Behavior Principles for Global Security
- In Summary
- Chapter 8: Applying Behavior Principles: Predicting Group Malicious Behavior
- Chapter 9: Applying a Predictive Methodology: From Principles to Practice
- Chapter 10: Predicting Domestic Threat
- Chapter 11: Computer Networks: Protection from External Threat
- Chapter 12: Computer Networks: Protection from Internal Threat
-
Chapter 13: Predicting Global Threat
- Understanding State-Sponsored Threat
- Describing and Identifying Future Global Threat
- Understanding the Role of Network Forensics
- Determining State Support of Terrorist Activities
- Moving from Detection to Protection: A Major Leap
- Advantages of AuBA #13: The AuBA Behaviorprint and How It Compares to Signatures
- In Summary
-
Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
- Part III: Applying Tools and Methods
- Part IV: Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security
- Foreword
- Introduction
- Download CD/DVD content
Product information
- Title: Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
- Author(s):
- Release date: June 2012
- Publisher(s): Wiley
- ISBN: 9781118166130
You might also like
book
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art …
book
Tribe of Hackers Red Team
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
How to Measure Anything in Cybersecurity Risk
A ground shaking exposé on the failure of popular cyber risk management methods How to Measure …