A complete guide to understanding and fighting advanced persistent threats--today's most destructive risk to enterprise security Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD). APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get--and stay--ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks. Reverse Deception: Organized Cyber Threat Counter-Exploitation features: Full coverage of the #1 feared type of network attack today, the APT Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work Foreword by Fred Feer, a security professional with 40 years' experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm Cat-and-mouse strategies from the best in the game--explains how to implement deception and disinformation techniques against a variety of incoming threats ai
"synopsis" may belong to another edition of this title.
In-depth counterintelligence tactics to fight cyber-espionage
"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot
Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.
Sean M. Bodmer, CISSP, CEH, is Chief Researcher of Counter-Exploitation Intelligence at CounterTack, Inc. a next generation endpoint security firm. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits.
Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intelligence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanford University in Social Psychology in 1993.
Gregory Carpenter, CISM, is the owner of Gregory Carpenter Enterprises LLC. Previous positions include Counterintelligence Team Leader at the Army Research Laboratory, Senior Combat Developer for Army Cyber Command a span of several years at the National Security Agency / Central Security Service as a detailed military officer: Action Officer in the Information Warfare Support Center, Chief of the Global Team in the Tailored Military Planning Office, Chief of Space Operations and Functional Team Lead for Electronic Warfare in the Combined Military Planning and Access Strategies Office. Prior to that, Mr. Carpenter worked as the Technology Plans Officer at the Joint Task Force for Global Network Operations and served as the Executive Officer of the Army Material Commands G2 (Intelligence & Security) office. In his 27 year military career, he served in several capacities in the Infantry, Logistics, Medical Service and Military Intelligence branches.
Jade Jones, JD, has 15 years practice experience. Areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.
"About this title" may belong to another edition of this title.
Book Description Book Condition: Brand New. PAPERBACK,Book Condition New, Brand New, Softcover, International Edition. We Do not Ship APO FPO AND PO BOX. Cover Image & ISBN may be different from US edition but contents as US Edition. Printing in English language. Quick delivery by USPS/UPS/DHL/FEDEX/ARAMEX ,Customer satisfaction guaranteed. We may ship the books from Asian regions for inventory purpose. Bookseller Inventory # ABESTTND1793
Book Description 2012. PAP. Book Condition: New. New Book. Shipped from US within 10 to 14 business days. Established seller since 2000. Bookseller Inventory # KB-9780071772495
Book Description 2012. Soft cover. Book Condition: New. This book is BRAND NEW Soft cover International edition with black and white printing. ISBN number & cover page may be different but contents identical to the US edition word by word. Book is in English language. Bookseller Inventory # UN-TM-IN-372
Book Description Paperback. Book Condition: New. Softcover Book, Condition: New. 1st Edition. [Please Read Carefully Before Buying], This Is An International Edition. Printed In Black and White. 464 Pages, Book Cover And ISBN No May Be Different From US Edition. Restricted Sales Disclaimer Wordings Not For Sales In USA And Canada May Be Printed On The Cover Of The Book. Standard Shipping 7-14 Business Days. Expedited Shiping 4-8 Business Days. ***WE DO NOT ENTERTAIN BULK ORDERS.*** The Books May Be Ship From Overseas For Inventory Purpose. Bookseller Inventory # 359638
Book Description Book Condition: New. New and unused. 30 Day Satisfaction Guarantee. Bookseller Inventory # 3148LU001ICL
Book Description Paperback. Book Condition: New. New Softcover International Edition, Printed in Black and White, Different ISBN, Same Content As US edition, Book Cover may be Different, in English Language. Bookseller Inventory # 20645
Book Description Paperback. Book Condition: New. New. Softcover book, 1st Edition. (Read Description Before Buying), This is an international Edition. Black and White Book. ISBN or covers May Be Different From US Edition. Book may have Restricted Sales Disclaimer Wordings printed on cover. Books May Be Shipped From Overseas as per stock status. Bookseller Inventory # 758379
Book Description 2012. PAP. Book Condition: New. New Book.Shipped from US within 10 to 14 business days. Established seller since 2000. Bookseller Inventory # IB-9780071772495
Book Description Paperback. Book Condition: New. Bookseller Inventory # 4964948
Book Description McGraw-Hill Education - Europe, United States, 2012. Paperback. Book Condition: New. 231 x 185 mm. Language: English . Brand New Book. In-depth counterintelligence tactics to fight cyber-espionage A comprehensive and unparalleled overview of the topic by experts in the field. --Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement. Bookseller Inventory # AAS9780071772495