CHAPTER
7
Operational Deception
image
 
Today’s computer network security industry operates like this: They go up into the observatory and look at the stars. They look into the night skies and see the stars and refuse to accept what they are looking at happened billions of years ago, not just a few moments ago. Computer security “experts” today sit and look at the activities that have happened on their network and refuse to accept that the damage is done and the event is over. Once they see it, it is too late. They look at defending their networks all wrong.
—Angelo Bencivenga, Chief of the Army Research Lab Computer Incident Response Team
By now you ...

Get Reverse Deception: Organized Cyber Threat Counter-Exploitation now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.