Reverse Deception

Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author Sean Bodmer
Max Kilger
Gregory Carpenter
Jade Jones
Country United States
Language English
Genre Cyber Security
Publisher McGraw-Hill Publishers
Publication date
24 July 2012[1]
Media type Paperback[2]
Pages 464 pp[1]
ISBN 978-0071772495

Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook by Sean Bodmer, Max Kilger, Gregory Carpenter, and Jade Jones, about providing methods to rectify Advanced Persistent Threats.[3] It details how to identity APTs and prioritize actions through applying skilled field-tested private- and government-sector methods.[3] It also trains one to expose, pursue, and charge the creators of Advanced Persistent Threats.[3] Additionally, the authors explain and demonstrate how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The authors provide full coverage of legal and ethical issues; specifically, how an IT professional can approach a corporate lawyer and explain what they would like to do with implementing deceptive network options in a language the legal council will understand. Computer adversary profiling and counterintelligence techniques assist professionals and the book adds another dimension by rounding out with operational vetting, and security team management.

Content

Some of the features of the book are.[3]

  • Figuring out the types of enemies threats derive from.
  • Analysis of cyber espionage tactics seen in the United States and globally, with comparisons of type of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa.
  • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
  • Cat-and-mouse approaches which explain how to use duplicity and disinformation techniques against incoming threats.
  • Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
  • How to distinguish the appearance of malicious code
  • Identify, analyze, and block APTs
  • Value Chain Management
  • Counter espionage and espionage
  • Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.

Authors

  • Sean M. Bodmer, CISSP, CEH, is founder and chief technologist at Pragmatik IO Grouip, INC
  • Dr Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler.
  • DrPH (c) Gregory Carpenter, CISM, is an adjunct professor at Northern Virginia CC, on the international board of advisors at the MacKenzie Institute and on the board of directors of ATNA Systems.
  • Jade Jones, Juris Doctor with experience including information operations and space law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.

Referenced In text

Heginbotham, E. (2015). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017. Santa Monica, CA: RAND.

Heckman, K. E., Stech, F. J., Thomas, R. K., Schmoker, B., & Tsow, A. W. (2015). Cyber denial, deception and counter deception: a framework for supporting active cyber defense.

Jajodia, S., Subrahmanian, V. S., Swarup, V., & Wang, C. (2016). Cyber deception: building the scientific foundation.

See also

References

  1. 1 2 "Reverse Deception Organized Cyber Threat Counter-Exploitation teaches you to debunk, pursue, and charge cyber attackers". Barnesandnoble.com. Retrieved 31 October 2016.
  2. "Identify, analyze, and block APTs". Barnesandnoble.com. Retrieved 31 October 2016.
  3. 1 2 3 4 "The intricate guide of detecting malicious code and decode the types of enemies they originate from". helpnetsecurity.com. 12 July 2012. Retrieved 31 October 2016.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.