Develop a Well-Measured Defense Against Cybercriminals
When we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That's lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.--from the preface by Richard Thieme.
Kevin Mitnick Exposed
The infamous hacker Kevin D. Mitnick allows himself and one of his more significant hacks to be weighed and measured.
Cyber Terrorist: Just a Media Buzzword?
Learn how the second we become narrow-minded about the security of our organizations and the resolve of our cyber enemy is the second we become vulnerable to some of the worlds most dangerous minds.
Understand Adversary Models
Can you answer the same questions your adversary will be asking, such as 'If I were to attack this target, what effort will be made to identify me, if my attack is detected?'
Characterize Specific Threats
Identify where the real threats to your most critical assets lay and learn to answer the question of why you believe those threats are so real.
Manage the Insider Threat
See how the key to early insider threat detection is in understanding how disgruntled employees move down the critical pathway towards an attack.
Characterize the Extremes-Terrorists and Nation States
See why the authors believe that the concept of cyber terrorism should be viewed as a very real and critical emerging threat.
Monitor a Cyber Stalker
Learn how software concepts such as 'WarmTouch' can help restore the psychological insights lost through traditional, technology driven insider detection techniques.
Case Studies Offer Insight and Lessons
See how characterization theory can be used to analyze some of histories more memorable incidents with 20/20 vision.
Your Solutions Membership Gives You Access to:
Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page
'From the Author' Forum where the authors post timely
The complete code listings from the book
These downloadable e-booklets:
WarDriving: Drive, Detect, Defend: Learning to WarDrive
Stealing the Network: How to Own a Continent: Product of Fate: The Evolution of a Hacker
IT Ethics Handbook: Right and Wrong for IT Professionals: Ethics for Programmers and Analysts
Richard Thieme's Islands in the Clickstream: Reflections on Life in a Virtual World
Foreword by Jeff Moss
Chapter 1: Introduction
Chapter 2: Theoretical Characterization Metrics
Chapter 3: Disclosure and the Cyber Food Chain
Chapter 4: Rating the Attack: Post-Incident Characterization Metrics
Chapter 5: Asset Threat Characterization
Chapter 6: Bringing It All Together: Completing the Cyber Adversary Model
Chapter 7: WarmTouch: Assessing the Insider Threat and Relationship Management
Chapter 8: Managing the Insider Threat
Chapter 9: The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures
Chapter 10: Characterizing the Extremes-Terrorists and Nation States
Chapter 11: Conclusions
Chapter 12: Return on Investment