Commencez à lire Cyber Adversary Characterization: Auditing the Hacker Mind sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Cyber Adversary Characterization: Auditing the Hacker Mind
 
Agrandissez cette image
 

Cyber Adversary Characterization: Auditing the Hacker Mind [Format Kindle]

Tom Parker , Marcus Sachs , Eric Shaw , Ed Stroz

Prix conseillé : EUR 36,00 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 41,09
Prix Kindle : EUR 25,20 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 15,89 (39%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 25,20  
Broché EUR 41,09  

Descriptions du produit

Présentation de l'éditeur

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy’s mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.

* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4143 KB
  • Nombre de pages de l'édition imprimée : 512 pages
  • Editeur : Syngress; Édition : 1 (9 juillet 2004)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B0014EKPQU
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°301.988 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 2.8 étoiles sur 5  6 commentaires
9 internautes sur 10 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Uneven quality 27 août 2004
Par W Boudville - Publié sur Amazon.com
Format:Broché
An uneven book. The preface and last chapter are by far the best parts. Noted technology commentator Richard Thieme ("Islands in the Clickstream") gives the preface. A mere 4 pages. But very eloquent and lucid. A joy to read. The last chapter is a semi-ficticious narrative of how a hacker breaks into various computers. Unix and network experts will like the depth and ingenuity described. It can be very educational, even for experienced sysadmins.

But other chapters are poorly done. For example, Chapter 2 is on Theoretical Characterisation Metrics. It repeatedly uses various conditional probabilities, but with a wrong notation. For a probability of B given A, it uses p(B)/A. The standard notation is P(B|A). Used for decades in statistics course. First year undergraduate level.

Other chapters, presumably written by different people, do use the correct notation. But Chapter 3, on the Cyber Food Chain, has an even more disturbing flaw. It has tables of what it calls mean inhibitor values. Derived from sets of values with only 1 significant figure. But the means are given to 4 significant figures! At best, the means only have 2. What this author is doing is imputing a false accuracy of 2 extra significant figures, or 100 times greater than actuality. More strictly, it is probably close to 1000 times greater, because the mean is really no better than one significant figure.

So what? Well, given that the authors goof on such elementary steps, it should give you serious reservations about their more "sophisticated" operations, where they discuss various metrics.

Another thing. One chapter's title is mis-spelled on the top of every page in the chapter. Irritating. Makes one wonder about the proof reading.
7 internautes sur 8 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 A methodical assessment of risk... 25 août 2004
Par Thomas Duff - Publié sur Amazon.com
Format:Broché
I finished reading Cyber Adversary Characterization - Auditing The Hacker Mind by Tom Parker, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. This is a very different book than anything I've seen, read, or reviewed...

Chapter breakout: Introduction; Theoretical Characterization Metrics; Disclosure and the Cyber Food Chain; Rating the Attack: Post-Incident Characterization Metrics; Asset Threat Characterization; Bringing It All Together: Completing the Cyber Adversary Model; WarmTouch: Assessing the Insider Threat and Relationship Management; Managing the Insider Threat; The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures; Characterizing the Extremes - Terrorists and Nation States; Return on Investment; Final Words; Glossary; Index

Most books that concern themselves with the "hacker mindset" do so with personality characterizations and attack methods. When you get done, you may understand how attacks occur, but you're no further along in doing a critical risk assessment of your particular environment. This book is the first I've seen that attempts to analyze the components mathematically in order to allow you to weight different scenarios against each other. The authors do a decent job in taking individual characteristics of the attacker, the environment, and the target, explaining how each component affects an attack scenario, and then giving a formula that can be used to assign a numeric value. While you may not agree with the interpretation, it's a rigorous approach to something that can be hard to quantify.

I haven't decided whether I approve of the WarmTouch chapter. It's a software package developed by the authors that attempts to chart threat assessment from a person based on email wording, actions, and other observed behavior. The idea is interesting, but I normally have issues with a book like this being used to push an author's product. I'll just say buyer beware in this case...

Bottom line... this would be a useful read for someone in security consulting and auditing, and would help an organization take a methodical view of their environment for risk assessment. There's not much on the book market like this volume.
4 internautes sur 5 ont trouvé ce commentaire utile 
1.0 étoiles sur 5 Poorly Written Book that Needs Serious Editing 27 août 2005
Par CyberChick - Publié sur Amazon.com
Format:Broché|Achat vérifié
This book attempts to discuss a topic of great interest to me. Since there are no other books in print that address this topic, I eagerly bought the book with great expectations. Unfortunatly I have been highly disappointed.

I highly recommend you avoid this book if you have an aversion to the gross butchering of the English language. I have found this book to be so far over the line of good writing that it is distracting. I haven't even been able to make it out of the second chapter! Sentence structures are unnecessarily complex and wordy. The text is replete with grammatical errors and misspellings. The author created terms to describe his concepts, yet the terms have other connotations, making it further difficult to understand. Parsing and understanding what the author is trying to say in certain passages is difficult at best. I'm sure if I had been in meetings with this author, I would know his language and intuitively understand what he means, but the new reader, devoid of that knowledge, is at a significant disadvantage. If this book had been properly edited, it would be about half its size. One has to ask what the publisher was thinking, or not.

This is most unfortunate. The threat of cyber attacks against national interests and critical infrastructure is very high. Having a book that proposes a systematic methodology to help identify and address those threats would be most useful.
1.0 étoiles sur 5 Not clear, little useful information 5 avril 2014
Par a reader - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
I concur with the 1-star rating by CyberChick for this book. I gave up on it at page 25--part way into Chapter 2. The prose goes on and on without a clear message nor conveying much useful information. Skimming ahead, it looks like later sections might be written by other authors and be better, but then again, they may not. I'm cutting my losses and giving up.
0 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Know thy self, know thy enemy 16 août 2005
Par Christopher Byrne - Publié sur Amazon.com
Format:Broché
Know thy enemy. This is only part of a famous quote by Sun Tzu. It is often quoted and is quite appropriate when discussing Cyber Adversary Characterization: Auditing The Hacker Mind (Tom Parker, Eric Shaw, et al, Syngress Press, 2004, 356 Pages, ISBN 1931836116). But to truly appreciate this book, which includes an account of Kevin Mitnick's first hand description of one of his attacks, you need to think about the entire quote from The Art of War: "Know thy self, know thy enemy. A thousand battles, a thousand victories."

The battle against hackers is not a single battle, but an on-going series of battles against an enemy that is often unseen and unknown. What the authors of this book attempt to do is offer a glimpse in the minds of hackers, what predisposes them to their behaviours, and an understanding of how this knowledge might be used to gain an advantage over this unseen enemy. To do so requires discussions of real events, psychology and modeling.

As such, this book is not for everyone, especially those who want an easy read. Psychological modeling is a difficult task to not only do, but to understand. The authors do their best in making this as easy as possible to understand, but I know I still had to re-read some sections multiple times. If you read this book, you will not walk away citing parts verbatim, but you will have a good desk reference to use when needed.

What is especially valuable in this book is the coverage of threats, both internal and external. The authors not only discuss this in terms and concepts, but offer methods to model and prioritize the threats. Have you ever thought about how myopic and narrow approaches can actually put you at greater risk?

Who Should Read This Book?

This is not a book for generalists. It really is for security specialists and students of security who want to get more than a superficial knowledge of the subject. Perhaps it might even be of interest to students of sociology and psychology. Tzu also said, "The opportunity to secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself." That is the reason this book is one for the library of .serious students of the topic. If you do not fit any of these categories, you might want to steer clear. If you don't, know what you are getting into.

Scorecard

Par on an Par 4
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique