In-depth counterintelligence tactics to fight cyber-espionage qA comprehensive and unparalleled overview of the topic by experts in the field.q--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your networkas vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcementAnalysis. Value networks are aany set of roles, interactions, and relationships that generate specific types of business, ... Additionally, new types of value and value exchanges have emerged in the intertwining technical and social changes of global, standardized computer networking. ... (for example, movies.com) and wholly digital goods such as virtual land in Second Life or virtual currencies like Bitcoin.
|Title||:||Reverse Deception: Organized Cyber Threat Counter-Exploitation|
|Author||:||Sean Bodmer, Dr. Max Kilger, Gregory Carpenter, Jade Jones|
|Publisher||:||McGraw Hill Professional - 2012-07-03|