Items related to Attribution of Advanced Persistent Threats: How to...

Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage - Hardcover

 
9783662613122: Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

Synopsis

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.

Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.

This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

"synopsis" may belong to another edition of this title.

About the Author

Dr. Timo Steffens was involved in the analysis of many of the most spectacular cyber-espionage cases in Germany. He has been tracking the activities and techniques of sophisticated hacker groups for almost a decade.


From the Back Cover

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.

Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.

This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

The Content

  • Advanced Persistent Threats
  • The attribution process
  • Analysis of malware
  • Attack infrastructure
  • Analysis of control servers
  • Geopolitical analysis
  • Telemetry - data from security products 
  • Methods of intelligence agencies 
  • Doxing
  • False flags
  • Group set-ups
  • Communication
  • Ethics of attribution

The Target Audience

  • IT-security professionals
  • International relations researchers
  • Technical journalists
  • Employees of organizations that are targeted by Advanced Persistent Threats

The Author
Dr. Timo Steffens was involved in the analysis of many of the most spectacular cyber-espionage cases in Germany. He has been tracking the activities and techniques of sophisticated hacker groups for almost a decade.


"About this title" may belong to another edition of this title.

  • PublisherSpringer Vieweg
  • Publication date2020
  • ISBN 10 3662613123
  • ISBN 13 9783662613122
  • BindingHardcover
  • LanguageEnglish
  • Edition number1
  • Number of pages219

Buy Used

Condition: Good
Ship within 24hrs. Satisfaction...
View this item

£ 4.42 shipping from U.S.A. to United Kingdom

Destination, rates & speeds

Other Popular Editions of the Same Title

9783662613153: Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage

Featured Edition

ISBN 10:  3662613158 ISBN 13:  9783662613153
Publisher: Springer Vieweg, 2021
Softcover

Search results for Attribution of Advanced Persistent Threats: How to...

Stock Image

Steffens, Timo
ISBN 10: 3662613123 ISBN 13: 9783662613122
Used Hardcover

Seller: BooksRun, Philadelphia, PA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: Good. 1st ed. 2020. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 3662613123-11-1

Contact seller

Buy Used

£ 17.03
Convert currency
Shipping: £ 4.42
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Stock Image

Steffens, Timo
ISBN 10: 3662613123 ISBN 13: 9783662613122
Used Hardcover

Seller: BooksRun, Philadelphia, PA, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: Very Good. 1st ed. 2020. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 3662613123-8-1

Contact seller

Buy Used

£ 17.03
Convert currency
Shipping: £ 4.42
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 3 available

Add to basket

Stock Image

Steffens, Timo
Published by Springer Vieweg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
Used Hardcover

Seller: SecondSale, Montgomery, IL, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Condition: Very Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00066071346

Contact seller

Buy Used

£ 18.80
Convert currency
Shipping: £ 25.80
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Steffens, Timo
Published by Springer Vieweg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
Used Hardcover

Seller: SecondSale, Montgomery, IL, U.S.A.

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00076233470

Contact seller

Buy Used

£ 18.80
Convert currency
Shipping: £ 25.80
From U.S.A. to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Timo Steffens
Published by Springer Fachmedien Wiesbaden, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
New Hardcover

Seller: PBShop.store UK, Fairford, GLOS, United Kingdom

Seller rating 4 out of 5 stars 4-star rating, Learn more about seller ratings

HRD. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # S0-9783662613122

Contact seller

Buy New

£ 96.97
Convert currency
Shipping: FREE
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Stock Image

Steffens, Timo (Author)
Published by Springer Vieweg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
New Hardcover

Seller: Revaluation Books, Exeter, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Hardcover. Condition: Brand New. 205 pages. 9.75x6.75x1.00 inches. In Stock. Seller Inventory # __3662613123

Contact seller

Buy New

£ 89.99
Convert currency
Shipping: £ 6.99
Within United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Timo Steffens
Published by Springer Berlin Heidelberg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
New Hardcover
Print on Demand

Seller: moluna, Greven, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Gebunden. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Explains how hackers operate and which mistakes they makePresents the technical methods to track and identify the perpetratorsCompares the approaches of security companies and government agencies. Seller Inventory # 388454337

Contact seller

Buy New

£ 78.63
Convert currency
Shipping: £ 21.20
From Germany to United Kingdom
Destination, rates & speeds

Quantity: Over 20 available

Add to basket

Seller Image

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
New Hardcover
Print on Demand

Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats. 220 pp. Englisch. Seller Inventory # 9783662613122

Contact seller

Buy New

£ 93.48
Convert currency
Shipping: £ 9.33
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 2 available

Add to basket

Seller Image

Timo Steffens
Published by Springer Berlin Heidelberg, 2020
ISBN 10: 3662613123 ISBN 13: 9783662613122
New Hardcover

Seller: AHA-BUCH GmbH, Einbeck, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats. Seller Inventory # 9783662613122

Contact seller

Buy New

£ 93.48
Convert currency
Shipping: £ 11.87
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

Seller Image

Timo Steffens
ISBN 10: 3662613123 ISBN 13: 9783662613122
New Hardcover
Print on Demand

Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Buch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.Springer Vieweg in Springer Science + Business Media, Abraham-Lincoln-Straße 46, 65189 Wiesbaden 220 pp. Englisch. Seller Inventory # 9783662613122

Contact seller

Buy New

£ 93.48
Convert currency
Shipping: £ 29.69
From Germany to United Kingdom
Destination, rates & speeds

Quantity: 1 available

Add to basket

There are 1 more copies of this book

View all search results for this book