
Cyber Adversary Characterization
Auditing the Hacker Mind
By: Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz
Paperback | 1 July 2004
At a Glance
512 Pages
22.9 x 17.8 x 2.29
Paperback
$162.50
or 4 interest-free payments of $40.63 with
orAims to ship in 10 to 15 business days
When will this arrive by?
Enter delivery postcode to estimate
* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.
* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.
* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.
Preface | p. xiii |
Foreword | p. xxvii |
Introduction | p. 1 |
Cyber Adversary Characterization | p. 2 |
A First-Person Account from Kevin D. Mitnick | p. 4 |
Insider Lessons Learned | p. 7 |
Cyber Terrorist: A Media Buzzword? | p. 8 |
Failures of Existing Models | p. 12 |
High Data Quantities | p. 13 |
Characterization Types | p. 14 |
Introduction to Characterization Theory | p. 17 |
Theoretical Characterization Metrics | p. 19 |
Introduction | p. 20 |
The Adversary Object Matrix | p. 21 |
Adversary Property Relationships | p. 23 |
Environment Property to Attacker Property | p. 23 |
Attacker Property to Target Property | p. 24 |
Other (Conditional) Adversarial Property Relationships | p. 24 |
The Adversary Model--"Adversary Environment Properties" | p. 25 |
Political and Cultural Impacts | p. 25 |
Environment Property/Attacker Property Observable Impacts | p. 33 |
Adversarial Group, not "Hacker Group"! | p. 34 |
The Adversary Model--"Attacker Properties" | p. 37 |
Resources Object | p. 38 |
Inhibitor Object | p. 41 |
Driver/Motivator Object | p. 45 |
Summary | p. 48 |
Disclosure and the Cyber Food Chain | p. 49 |
Introduction | p. 50 |
Vulnerability Disclosure and the Cyber Adversary | p. 50 |
"Free For All": Full Disclosure | p. 51 |
Disclosure Attack Capability and Considerations | p. 53 |
Probability of Success Given an Attempt | p. 55 |
Probability of Detection Given an Attempt | p. 56 |
"Symmetric" Full Disclosure | p. 56 |
Responsible Restricted "Need to Know" Disclosure | p. 58 |
Responsible, Partial Disclosure and Attack Inhibition Considerations | p. 59 |
"Responsible" Full Disclosure | p. 60 |
Security Firm "Value Added" Disclosure Model | p. 62 |
Non-Disclosure | p. 65 |
The Vulnerability Disclosure Pyramid Metric | p. 66 |
Pyramid Metric Capability and Attack Inhibition | p. 67 |
Pyramid Metric and Capability: A Composite Picture Pyramid | p. 68 |
Comparison of Mean Inhibitor Object Element Values | p. 71 |
The Disclosure Food Chain | p. 72 |
Security Advisories and Misinformation | p. 73 |
Summary | p. 76 |
Rating the Attack: Post-Incident Characterization Metrics | p. 77 |
Introduction: Theoretical Crossover and the Attack Point Scoring Systems | p. 78 |
The Source of the Problem | p. 78 |
Variables of Attack Tools to Consider | p. 80 |
Tool-Scoring Metrics | p. 80 |
The Ease With Which an Attack Tool Is Used | p. 82 |
The Availability of an Attack Tool | p. 83 |
Nontechnical Skill-Related Prerequisites | p. 84 |
Common Types of Attack Tools | p. 84 |
Mass Rooters | p. 84 |
Port-Scanning Tools | p. 86 |
Operating System Enumeration Tools | p. 87 |
Software Exploits | p. 89 |
Commercial Attack Tools | p. 90 |
Caveats of Attack Tool Metrics | p. 91 |
Attack Technique Variables | p. 92 |
Nontechnological Resources Required | p. 92 |
The Distribution Level of the Attack Technique | p. 92 |
Any Attack Inhibitors Reduced Through the Use of the Attack Technique | p. 93 |
The Ease With Which the Attack Technique Is Implemented | p. 94 |
Technique-Scoring Metrics | p. 94 |
Common Types of Attack Techniques | p. 95 |
Network Service and Vulnerability Enumeration Techniques | p. 95 |
Operating System Enumeration Techniques | p. 98 |
Automated and Mass-Exploitation Techniques | p. 99 |
Automated Agent Attitude to Attack Inhibitor Deductions | p. 100 |
Web Application Exploitation Techniques | p. 101 |
Additional Attack Scoring Examples | p. 103 |
Caveats: Attack Behavior Masquerading | p. 104 |
Summary | p. 105 |
Asset Threat Characterization | p. 107 |
Introduction | p. 108 |
The Target Property | p. 109 |
Who Cares About Your Systems Today? | p. 110 |
Attack Preference Tables | p. 110 |
Target Properties: Attack Driver and Inhibitor Influence | p. 111 |
Target Environment Property Influences | p. 111 |
Target Technical Property Influences | p. 115 |
The Asset Threat Characterization | p. 116 |
Preparing for the Characterization | p. 116 |
Identifying What's Relevant to You | p. 118 |
Attacking Positive Attack Inhibitors | p. 122 |
Fictional Asset Threat Characterization Case Study | p. 122 |
Does a Real Threat Exist? | p. 123 |
Case Study Conclusions | p. 131 |
Summary | p. 136 |
Bringing It All Together: Completing the Cyber Adversary Model | p. 137 |
Introduction | p. 138 |
Intermetric Component Relationships | p. 138 |
Filling in the Blanks | p. 138 |
Internet Metric Relationship Result Reliability Calculations | p. 141 |
Summary | p. 143 |
WarmTouch: Assessing the Insider Threat and Relationship Management | p. 145 |
Introduction | p. 146 |
The Challenges of Detecting the Insider Threat | p. 146 |
An Approach to the Insider Problem | p. 148 |
Case Illustrations | p. 149 |
Detecting Insider Risk and Deception--A Bank Systems Administrator | p. 149 |
Robert Hanssen at the FBI | p. 153 |
Identifying the Source of Anonymous Threats--Are They from the Same Author? | p. 157 |
Extortion Attempt by a Russian Hacker Against Bloomberg Financial | p. 158 |
Monitoring a Cyber Stalker | p. 161 |
Relationship Management | p. 163 |
Summary | p. 168 |
References | p. 169 |
Footnote | p. 170 |
Managing the Insider Threat | p. 171 |
Introduction: Setting the Stage | p. 172 |
Prevention | p. 176 |
Screening and Its Weaknesses | p. 176 |
Education and Prevnetion | p. 179 |
Detection | p. 184 |
Detection Challenges | p. 184 |
Detection Challenges Along the Critical Pathway | p. 184 |
Detection Indicators and Challenges by Subject Subtype | p. 193 |
Insider Case Management | p. 199 |
Summary | p. 203 |
References | p. 203 |
The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures | p. 205 |
Introduction | p. 206 |
Historical Context | p. 208 |
The General Public and the Internet | p. 209 |
Increasing Threats and Vulnerabilities | p. 210 |
Critical Infrastructure Vulnerabilities | p. 212 |
Terrorist Attacks of September 2001 | p. 214 |
Eligible Receiver and Solar Sunrise | p. 216 |
New Organizations and New Discoveries | p. 218 |
Identifying and Characterizing the Cyber Threat | p. 220 |
Nation States | p. 222 |
Terrorists | p. 223 |
Espionage | p. 223 |
Organized Crime | p. 224 |
Insiders | p. 225 |
Hackers | p. 226 |
Summary | p. 228 |
Characterizing the Extremes--Terrorists and Nation States | p. 231 |
Introduction | p. 232 |
The Nation State Cyber Adversary | p. 232 |
Nation State Cyber Adversary Attractors | p. 233 |
Nation State Cyber Adversary Deterrents | p. 236 |
Qualifying the Nation State Threat | p. 239 |
International Terrorists and Rogue Nations | p. 241 |
Single-Issue Terrorist Organizations/Hacktivists | p. 246 |
The Al Qaeda Threat--Kill With a Borrowed Sword | p. 249 |
Indirect Compromise | p. 251 |
Compromise Via a Customized Attack Tool | p. 252 |
Physical Insider Placement | p. 253 |
Data Interception/Sniffing/Info Gathering | p. 254 |
Malicious Code | p. 254 |
Denial of Service Code | p. 255 |
Distributed Denial of Service | p. 255 |
Directed Energy | p. 256 |
Physical Threats to Information Technology Systems | p. 256 |
Differentiation of the Cyber Terrorist Adversary | p. 257 |
Summary | p. 259 |
Footnotes and References | p. 260 |
Conclusions | p. 263 |
A Look Back | p. 264 |
Kevin D. Mitnick: Attack, Weighed and Measured! | p. 264 |
Kevin's Environment Property Examined | p. 264 |
Environment Property Influences on Attacker Resources Object | p. 265 |
Environment Property Influences on Attacker Inhibitor & Driver Object(s) | p. 268 |
Summary | p. 270 |
And Now for Something a Little Different! | p. 270 |
Return on Investment | p. 271 |
Playing the Market | p. 273 |
Information Leakage at the Packet Level | p. 274 |
Corrupted by Greed | p. 277 |
Revenge of the Nerd | p. 278 |
A Lead from Las Vegas | p. 280 |
The Call of Opportunity | p. 281 |
Initial Reconnaissance | p. 282 |
Shrax: The Ultimate Rootkit | p. 284 |
Throwaway Account | p. 288 |
Seeking the Prize | p. 293 |
Hacking .MIL | p. 298 |
Triumph and New Toys | p. 302 |
Endnotes | p. 303 |
Aftermath...The Investigation Continues | p. 304 |
Final Words | p. 309 |
Acknowledgements | p. 310 |
Glossary | p. 311 |
Index | p. 313 |
Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9781931836111
ISBN-10: 1931836116
Published: 1st July 2004
Format: Paperback
Language: English
Number of Pages: 512
Audience: Professional and Scholarly
Publisher: Syngress Media,U.S.
Country of Publication: US
Dimensions (cm): 22.9 x 17.8 x 2.29
Weight (kg): 0.58
Shipping
Standard Shipping | Express Shipping | |
---|---|---|
Metro postcodes: | $9.99 | $14.95 |
Regional postcodes: | $9.99 | $14.95 |
Rural postcodes: | $9.99 | $14.95 |
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Sybex Study Guide
Paperback
RRP $157.95
$97.80
OFF

Mastering Blockchain
Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications
Paperback
RRP $152.00
$66.25
OFF

Cloud Native Application Protection Platforms
A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Paperback
RRP $125.50
$55.25
OFF
This product is categorised by
- Non-FictionSocial Services & WelfareCrime & Criminology
- Non-FictionEngineering & TechnologyTechnology in General
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Computer SecurityComputer Viruses