Book description
Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors.
The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers’ techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of:
•North Korea’s series of cyber attacks against financial institutions, which resulted in billions of dollars stolen
•The world of targeted ransomware attacks, which have leveraged nation state tactics to cripple entire corporate enterprises with ransomware
•Recent cyber attacks aimed at disrupting or influencing national elections globally
The book’s second part walks through how defenders can track and attribute future attacks. You’ll be provided with the tools, methods, and analytical guidance required to dissect and research each stage of an attack campaign. Here, Jon DiMaggio demonstrates some of the real techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among many other advanced threats. He now offers his experience to train the next generation of expert analysts.
Table of contents
- Title Page
- Copyright
- About the Author
- ACKNOWLEDGMENTS
- Introduction
-
Part I: An Advanced Cyber-Threat Landscape
- Chapter 1: Nation-State Attacks
- Chapter 2: State-Sponsored Financial Attacks
- Chapter 3: Human-Driven Ransomware
- Chapter 4: Election Hacking
-
Part II: Hunting and Analyzing Advanced Cyber Threats
- Chapter 5: Adversaries and Attribution
- Chapter 6: Malware Distribution and Communication
- Chapter 7: Open Source Threat Hunting
- Chapter 8: Analyzing a Real-World Threat
- Appendix A: Threat Profile Questions
- Appendix B: Threat Profile Template Example
- Endnotes
- Index
Product information
- Title: The Art of Cyberwarfare
- Author(s):
- Release date: April 2022
- Publisher(s): No Starch Press
- ISBN: 9781718502147
You might also like
book
The Art of Clean Code
Most software developers waste thousands of hours working with overly complex code. The eight core principles …
book
The Ghidra Book
The result of more than a decade of research and development within the NSA, the Ghidra …
audiobook
The Design of Everyday Things
First, businesses discovered quality as a key competitive edge; next came science. Now, Donald A. Norman, …
audiobook
The Manager's Path
Managing people is difficult wherever you work. But in the tech industry, where management is also …