Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Autor Will Gragido, John Pircen Limba Engleză Paperback – 7 mar 2011
This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis.
This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.
- Includes detailed analysis and examples of the threats in addition to related anecdotal information
- Authors’ combined backgrounds of security, military, and intelligence, give you distinct and timely insights
- Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them
Preț: 292.93 lei
Nou
Puncte Express: 439
Preț estimativ în valută:
56.06€ • 58.08$ • 46.79£
56.06€ • 58.08$ • 46.79£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597496131
ISBN-10: 1597496138
Pagini: 272
Ilustrații: 45 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.56 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597496138
Pagini: 272
Ilustrații: 45 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.56 kg
Editura: ELSEVIER SCIENCE
Public țintă
CISOs, Security Managers, IT Managers, Security Consultants, IT Auditors, Security Analysts, and Students in Information Security/Assurance college programsCuprins
Chapter 1. Introduction: Cybercrime and Espionage and the New Security 101
Chapter 2. Evolution Revolution: Maturity of Communications Systems and the Emergence of Advanced Web Technology
Chapter 3. The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security
Chapter 4. Mediating the Great Divorce: The Convergence of Physical and Logical SecurityNon-State Sponsored: Stealing Chapter 5: Information Is Our Business….and Business Is Good: Asymmetric Forms of Gathering Information
Chapter 6: State Sponsored Intelligence Types
Chapter 7: Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
Chapter 8: Rise of the Subversive Multi-Vector Threat
Chapter 9: Seven Commonalities of Subversive Multi-Vector Threats
Chapter 10: Examples of Compromise and Presence of Subversive Multi-Vector Threats
Chapter 11: Hiding in Plain Sight: Next Generation Techniques and Tools for Avoidance and Obfuscation
Chapter 12: Weapons of Our Warfare: Next Generation Techniques and Tools for Detection, Identification and Analysis
Chapter 2. Evolution Revolution: Maturity of Communications Systems and the Emergence of Advanced Web Technology
Chapter 3. The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security
Chapter 4. Mediating the Great Divorce: The Convergence of Physical and Logical SecurityNon-State Sponsored: Stealing Chapter 5: Information Is Our Business….and Business Is Good: Asymmetric Forms of Gathering Information
Chapter 6: State Sponsored Intelligence Types
Chapter 7: Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond
Chapter 8: Rise of the Subversive Multi-Vector Threat
Chapter 9: Seven Commonalities of Subversive Multi-Vector Threats
Chapter 10: Examples of Compromise and Presence of Subversive Multi-Vector Threats
Chapter 11: Hiding in Plain Sight: Next Generation Techniques and Tools for Avoidance and Obfuscation
Chapter 12: Weapons of Our Warfare: Next Generation Techniques and Tools for Detection, Identification and Analysis
Recenzii
"Risks have evolved. We haven’t. While we stabilize toward checkbox compliance, adversaries and IT accelerate onward. Adversaries know you’re compliant – and do not care – they’re counting on it. Let’s replace faith-based dogma with intellectual honesty. As fellow Cassandras, Will and John confront you with modern threat models and challenge you to adapt." --Joshua Corman, Research Director for Enterprise Security, The 451 Group
"During 2010 three specific names signaled a fundamental shift in the risks that come from dealing in an interconnected world: Project Aurora, Stuxnet, and Wikileaks. This book provides the insights of an intelligence analyst on what got us to this point, and forecasts what information security professionals will be dealing with in the near future." --James Turner, Advisor, IBRS
"Cybercrime and Espionage was probably the most comprehensive and relevant book on the cyber security landscape written to date. The authors captured the true essence of the methods and cyber trade craft backed with use case after use case. I find this book a must have for any security professional or executive that has the responsibility for ensuring the protection of their corporate infrastructure." --Alan Kessler VP & GM HP Networking Security Products Group/TippingPoint
"John and Will have done a great job in framing the threat landscape and pointing out just how far we have to go in order to truly understand the cyber threats confronting us, to better secure our networks, and to mitigate risk within our respective organizations. Cybercrime and Espionage is a great read and should provide a call to action for any executive management team. Well done." --Nick Lantuh, President of Netwitness Corporation
"Overall, this was a really interesting reading material. The authors managed to provide a fresh perspective on the intricacies surrounding modern cyber crime of today, but have not neglected the ‘big picture’." --Help Net Security
"During 2010 three specific names signaled a fundamental shift in the risks that come from dealing in an interconnected world: Project Aurora, Stuxnet, and Wikileaks. This book provides the insights of an intelligence analyst on what got us to this point, and forecasts what information security professionals will be dealing with in the near future." --James Turner, Advisor, IBRS
"Cybercrime and Espionage was probably the most comprehensive and relevant book on the cyber security landscape written to date. The authors captured the true essence of the methods and cyber trade craft backed with use case after use case. I find this book a must have for any security professional or executive that has the responsibility for ensuring the protection of their corporate infrastructure." --Alan Kessler VP & GM HP Networking Security Products Group/TippingPoint
"John and Will have done a great job in framing the threat landscape and pointing out just how far we have to go in order to truly understand the cyber threats confronting us, to better secure our networks, and to mitigate risk within our respective organizations. Cybercrime and Espionage is a great read and should provide a call to action for any executive management team. Well done." --Nick Lantuh, President of Netwitness Corporation
"Overall, this was a really interesting reading material. The authors managed to provide a fresh perspective on the intricacies surrounding modern cyber crime of today, but have not neglected the ‘big picture’." --Help Net Security