Book description
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.
- Establish the goals and scope of your reverse deception campaign
- Identify, analyze, and block APTs
- Engage and catch nefarious individuals and their organizations
- Assemble cyber-profiles, incident analyses, and intelligence reports
- Uncover, eliminate, and autopsy crimeware, trojans, and botnets
- Work with intrusion detection, anti-virus, and digital forensics tools
- Employ stealth honeynet, honeypot, and sandbox technologies
- Communicate and collaborate with legal teams and law enforcement
Table of contents
- Cover
- Copyright
- About the Author
- Contents
- Foreword
- Acknowledgments
- Introduction
- Chapter 1 State of the Advanced Cyber Threat
-
Chapter 2 What Is Deception?
- How Does Deception Fit in Countering Cyber Threats?
- Six Principles of Deception
- Traditional Deception
- Why Use Deception?
-
Deception Maxims
- “Magruder’s Principle”—Exploitation of a COG’s Perception or Bias
- “Limitations to Human Information Processing”
- “Multiple Forms of Surprise”
- “Jones’ Dilemma”
- “Choice of Types of Deception”
- “Husbanding of Deception Assets”
- “Sequencing Rule”
- “Importance of Feedback”
- “Beware of Possible Unwanted Reactions”
- “Care in the Design of Planned Placement of Deceptive Material”
- Understanding the Information Picture
- Conclusion
- Chapter 3 Cyber Counterintelligence
-
Chapter 4 Profiling Fundamentals
- A Brief History of Traditional Criminal Profiling
- The Emergence of Cyber Profiling
- Acquiring an Understanding of the Special Population
- The Objectives of Profiling
- The Nature of Profiling
- Basic Types of Profiling
- Two Logical Approaches to Profiling: Inductive vs. Deductive
- Information Vectors for Profiling
- Conclusion
- References
- Chapter 5 Actionable Legal Knowledge for the Security Professional
- Chapter 6 Threat (Attacker) Tradecraft
- Chapter 7 Operational Deception
- Chapter 8 Tools and Tactics
- Chapter 9 Attack Characterization Techniques
- 10 Attack Attribution
- 11 The Value of APTs
- 12 When and When Not to Act
- 13 Implementation and Validation
- Glossary
- Index
Product information
- Title: Reverse Deception: Organized Cyber Threat Counter-Exploitation
- Author(s):
- Release date: July 2012
- Publisher(s): McGraw-Hill
- ISBN: 9780071772501
You might also like
book
Cyber Reconnaissance, Surveillance and Defense
At a time when online surveillance and cybercrime techniques are widespread, and are being used by …
book
Surveillance and Threat Detection
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to …
book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a …
book
Trade Secret Theft, Industrial Espionage, and the China Threat
This book provides an overview of economic espionage as practiced by a range of nations from …