Reverse Deception

Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author Sean Bodmer, CISSP, CEH
Dr Max Kilger, PhD
DrPH(c) Gregory Carpenter, CISM
Jade Jones, Esq., JD[1]
Country United States
Language English
Series Jack Reacher
Genre Cyber Security
Publisher McGraw-Hill Publishers
Publication date
24 July 2012[1]
Media type Paperback[2]
Pages 464 pp[1]
ISBN 978-0071772495

Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook by Sean Bodmer, CISSP, CEH, Dr. Max Kilger, PhD, DrPH(c) Gregory Carpenter, CISM, and Jade Jones, ESQ about providing methods to rectify Advanced Persistent Threats.[3] It details how to identity APTs and prioritize actions through applying skilled field-tested private- and government-sector methods.[3] It also trains one to expose, pursue, and charge the creators of Advanced Persistent Threats.[3] Additionally, the authors explain and demonstrate how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The authors provide full coverage of legal and ethical issues; specifically, how an IT professional can approach a corporate lawyer and explain what they would like to do with implementing deceptive network options in a language the legal council will understand. Computer adversary profiling and counterintelligence techniques assist professionals and the book adds another dimension by rounding out with operational vetting, and security team management.

The book also covers a "theoretical" hack of the virtual currency, Bitcoin. The following year, Bitcoin was attacked and millions were stolen. [4]

Features inside book

Some of the features of the book are.[3]

Authors

Referenced In Text

Heginbotham, E. (2015). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017. Santa Monica, CA: RAND.

Heckman, K. E., Stech, F. J., Thomas, R. K., Schmoker, B., & Tsow, A. W. (2015). Cyber denial, deception and counter deception: a framework for supporting active cyber defense.

Jajodia, S., Subrahmanian, V. S., Swarup, V., & Wang, C. (2016). Cyber deception: building the scientific foundation.

See also

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.