Index
A
Addressing defensible security assessments
Addressing defensible systems administration
Advanced persistent threat (APT)
Adversary as a Service (AaaS)
Antagonist functions
APT attacker
APT emulation
Assessor recommendations
Attacker capability development
attacker types
demand
mitigation
payload deployment
response options
retaliation and recovery
target selection
Auditing
Automated communication with TCP port randomization prevention
Automated worm with bad automation logic
B
Bad cost benefit
Box thinking
Business intelligence professional
Business strategy
By-mail scams
C
CAPTR Reporting
cost benefit
mathematical analysis
safety
web/reverse risk relationships
CAPTR team engagement
CAPTR teamer assessment
CAPTR teaming
CAPTR team methodology
CAPTR team model
CAPTR team paradigm ...
Get Theoretical Cybersecurity: Principles and Advanced Concepts now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.