O'Reilly logo

Reverse Deception: Organized Cyber Threat Counter-Exploitation by Jade Jones, Gregory Carpenter, Dr. Max Kilger, Sean Bodmer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER
7
Operational Deception
image
 
Today’s computer network security industry operates like this: They go up into the observatory and look at the stars. They look into the night skies and see the stars and refuse to accept what they are looking at happened billions of years ago, not just a few moments ago. Computer security “experts” today sit and look at the activities that have happened on their network and refuse to accept that the damage is done and the event is over. Once they see it, it is too late. They look at defending their networks all wrong.
—Angelo Bencivenga, Chief of the Army Research Lab Computer Incident Response Team
By now you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required