Reverse Deception et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Reverse Deception sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Reverse Deception: Organized Cyber Threat Counter-exploitation [Anglais] [Broché]

Sean Bodmer , Max Kilger , Gregory S. Carpenter , Jeff R. Jones , Jade Jones

Prix : EUR 30,34 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 5 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le lundi 6 octobre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 21,78  
Broché EUR 30,34  

Description de l'ouvrage

1 août 2012

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.

  • Establish the goals and scope of your reverse deception campaign
  • Identify, analyze, and block APTs
  • Engage and catch nefarious individuals and their organizations
  • Assemble cyber-profiles, incident analyses, and intelligence reports
  • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
  • Work with intrusion detection, anti-virus, and digital forensics tools
  • Employ stealth honeynet, honeypot, and sandbox technologies
  • Communicate and collaborate with legal teams and law enforcement

Offres spéciales et liens associés


Descriptions du produit

Biographie de l'auteur

Sean M. Bodmer, CISSP, CEH, is a senior threat intelligence analyst at Damballa, Inc., a crimeware detection, security provider, and research firm consulting to Fortune 500 and 1,000 companies. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits.

Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intelligence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanford University in Social Psychology in 1993.

Gregory Carpenter, CISM,has earned numerous professional awards including the Joint Task Force for Global Network Operations Officer of the Quarter, recognition in the Who's Who in International Business, and serves on the U.S. Government's Cross Domain Solution Working Group, the Joint Wireless Working Group, and many others.

Jade Jones, JD, has 15 years practice experience. Areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.


Détails sur le produit


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.4 étoiles sur 5  11 commentaires
7 internautes sur 8 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great Material ! 18 juillet 2012
Par Researcher - Publié sur Amazon.com
Format:Broché|Achat vérifié
As a security researcher that deals with this same material on a daily basis I have to say this is a great book to own. The material is valid and up to date. The authors are active members of the infosec community and as such bring years of knowledge and experience to share with the readers. I highly recommend this book to anyone that is actively in this field as well as any prospecting students looking to jump into security field.
6 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great Information for Non-techies, Too 2 août 2012
Par john ives - Publié sur Amazon.com
Format:Broché|Achat vérifié
Reverse Deception earns my highest rating. As a technically challenged researcher, Reverse Deception provides multiple levels of adaptive understanding even I can enjoy. Surprisingly witty, the authors parse extremely complex topics into byte-size consumable product for easy consumption. The authors built in enough scenarios and vignettes to indicate they have real-world experiences in cyber and counter-espionage. I especially appreciate how Reverse Deception dissects Operation Aurora as an example of how even the best can be fooled. I highly recommend Reverse Deception as mandatory reading for intelligence professionals--techie or not.
5 internautes sur 6 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Definitive text on dealing with APTs 12 novembre 2012
Par Ben Rothke - Publié sur Amazon.com
Format:Broché
Advanced persistent threat (APT) is one of the most common information security terms used today and it is an undeniably real and dangerous menace.

Wikipedia notes that APT's usually refer to a group, such as a foreign government, with both the capability and the intent to persistently and effectively target a specific entity. The term is commonly used to refer to cyber threats, in particular that of Internet-enabled espionage using a variety of intelligence gathering techniques to access sensitive information, but applies equally to other threats such as that of traditional espionage or attack.

Every organization of size and scope is a target, and many of the world's largest firms and governments have been victims. In Reverse Deception: Organized Cyber Threat Counter-Exploitation, Dr. Max Kilger and his co-authors provide an effective counterintelligence approach in which to deal with APT. The good news is that the authors provide an effective framework. The bad news is that creating an effective defense is not an easy undertaking.

When it comes to APT, the de facto perpetrator is China. The book shows how to pursue and hopefully prosecute the perpetrator. But that begs the questions, how many firms can realistically defend themselves against an adversary like China, RBN or nation state?

In the introduction, the authors note that deception is about behavior, both induced in the adversary and undertaken by the deceiver to exploit it. To deceive, the authors write, it is not sufficient to induce belief in the adversary; it is necessary also to prepare and execute the exploitation of resultant behavior. Once again, preparation and execution against a nation state is not a small endeavor.

Chapter 1 sets the stage for the rest of the book and provides an overview of the topic and some examples of advanced and persistent threats, including Stuxnet, Operation Aurora, the RBN and more.

Being the biggest of all APT, China takes center stage in chapter 2 - What is Deception? That is nothing new as China has successful used deception for the last 2,000 years. China is referenced heavily in the book due to their extreme confidence and success in executing deception.

Chapter 3 - Cyber Counterintelligence (CI) details how to use CI to find the cyber-adversaries. The chapter provides both the basic investigative and operational techniques and tools, in addition to detailing how to use legal counsel to ensure that what you are doing is legal.

Chapter 5 gets into much more of the details around the legal issues, and what you can and can't do to your adversary. The chapter provides an excellent overview of how to quantify which persistent threats are the most dangerous. It provides nine areas to rank, in order to use as a metric to weight each and every threat.

By the time the reader gets to chapter 4 on profiling, they will likely be overwhelmed by the amount of work necessary to implement an effective cyber CI program, which is indeed the case. The amount of time to develop an APT program is for the most part unfeasible for most organizations. While the book does not get into the budgetary issues; CIO's, CISO's and other IT managers will likely have a difficult time getting any sort of budget to fund an APT program.

Part of the issue is that many firms don't have an effective IPS in place to they won't even know they are being attacked. In the majority of cases, the APT intrusion is not even discovered by the firm, rather an outside entity who notifies them. What is worse is the fact that in many cases, APT malware has been on the victim network often for years undetected.

In addition, in the same way in which people who are scammed once are often repeatedly scammed again; companies that are victims of an APT will often be repeat victims since the perpetrators may share that information with others.

A few of the authors have military and law enforcement background, which adds to their expertise and insights.

The book is meant to be used to pursue and prosecute the perpetrators of APT. With the exception of the military and a few Fortune 50 companies, the odds of effectively prosecuting APT perpetrators is quite small. Notwithstanding that difficulty, organizations must understand that they are under attack, and at least have some plan to assess their vulnerabilities.

This book is mainly an introduction to the topic, but does not provide a comprehensive strategy on how to implement an APT program. Such a reference would need to be at least a few times larger than this work.

There is a web site for the book, but it does not really do more than redirect you to Amazon and Barnes and Noble. Matthijs Koot has a detailed review of the book where he took the time to detail the hyperlinks to source the books web page should have had.

Reverse Deception: Organized Cyber Threat Counter-Exploitation may be overkill for most organization, but is nonetheless a necessary read to truly understand the danger.

For anyone looking to understand what APT's are and how to deal with them, the book provides a comprehensive and unparalleled overview of the topic by experts in the field.

If nothing else, the book provides the reader with an appreciation for how dedicated the perpetrators behind APT are. They are smart, sophisticated, have governments and military agencies on their side and they are numerous. One of the many challenges of dealing with the Chinese APT is that China can easily throw tens of thousands of highly-trained and sophisticated attackers at a target in the US, while the target may only be able to muster a few people to provide a cyber-defense.

One of the most important things to take from the book is the third word in the title - organized. Those carrying out APT are highly organized, prepared and meticulous. They often do things in a slow methodical manner to avoid detection. The book provides a detailed methodology to deal with such adversaries.

The downside is that the victim companies themselves lack that organization. Defending against APT requires much more than simply reading this invaluable text. It requires management support, budget, effective tools and a highly trained staff to correctly use those tools. The great advice in the book won't be of assistance if the team deployed does not know how to correctly use them.

While you will likely be outnumbered and outgunned when it comes to APT defense, Reverse Deception: Organized Cyber Threat Counter-Exploitation is a fascinating reference that ensures you won't go down without a fight.
5 internautes sur 6 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 excellent insight 1 août 2012
Par Denisa and Jim - Publié sur Amazon.com
Format:Broché
As a curious geek, I have only begun reading this; so far, I cannot recommend it highly enough. From the perspective of a layperson wishing to be better educated about cyber threats, and exploitation of all of the sensitive information that whizzes around the world on a daily basis, this book is a must-read. Very seldom will one come across material that really gets behind the scenes of Organized Cyber Threats, and gives the reader a realistic, and practical insider look at countering and beating the "bad guy" at their own game.
2 internautes sur 2 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great content, needs a serious editor but a worthy edition 7 août 2014
Par B Gutz - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
Still reading, very poorly edited and the introduction re occurs about 4 or 5 times. The content so far is very good, even great but seems to contain some paragraphs that are nothing but word count filler. Still I find the content driving me to give it 4 stars and as I close in on the end of the book I still give it 4 stars.

One note to the author/s would be: Frozen lakes are thickest in the middle and thinner towards the shores, might seem counter intuitive but its true.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?