Reverse Deception
Author |
Sean Bodmer, CISSP, CEH Dr Max Kilger, PhD DrPH(c) Gregory Carpenter, CISM Jade Jones, Esq., JD[1] |
---|---|
Country | United States |
Language | English |
Series | Jack Reacher |
Genre | Cyber Security |
Publisher | McGraw-Hill Publishers |
Publication date | 24 July 2012[1] |
Media type | Paperback[2] |
Pages | 464 pp[1] |
ISBN | 978-0071772495 |
Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook by Sean Bodmer, CISSP, CEH, Dr. Max Kilger, PhD, DrPH(c) Gregory Carpenter, CISM, and Jade Jones, ESQ about providing methods to rectify Advanced Persistent Threats.[3] It details how to identity APTs and prioritize actions through applying skilled field-tested private- and government-sector methods.[3] It also trains one to expose, pursue, and charge the creators of Advanced Persistent Threats.[3] Additionally, the authors explain and demonstrate how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The authors provide full coverage of legal and ethical issues; specifically, how an IT professional can approach a corporate lawyer and explain what they would like to do with implementing deceptive network options in a language the legal council will understand. Computer adversary profiling and counterintelligence techniques assist professionals and the book adds another dimension by rounding out with operational vetting, and security team management.
The book also covers a "theoretical" hack of the virtual currency, Bitcoin. The following year, Bitcoin was attacked and millions were stolen. [4]
Features inside book
Some of the features of the book are.[3]
- Figuring out the types of enemies threats derive from.
- Analysis of cyber espionage tactics seen in the United States and globally, with comparisons of type of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa.
- Uncover, eliminate, and autopsy crimeware, trojans, and botnets
- Cat-and-mouse approaches which explain how to use duplicity and disinformation techniques against incoming threats.
- Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
- How to distinguish the appearance of malicious code
- Identify, analyze, and block APTs
- Value Chain Management
- Counter espionage and espionage
- Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.
Authors
- Sean M. Bodmer, CISSP, CEH, is Chief Researcher of Counter-Exploitation Intelligence at CounterTack, Inc.
- Dr Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler.
- DrPH (c) Gregory Carpenter, CISM, is an Adjunct Professor at Northern Virginia CC, on the International Board of Advisors at the MacKenzie Institute & on the Board of Directors of ATNA Systems.
- Jade Jones, Juris Doctor with experience including Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.
Referenced In Text
Heginbotham, E. (2015). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017. Santa Monica, CA: RAND.
Heckman, K. E., Stech, F. J., Thomas, R. K., Schmoker, B., & Tsow, A. W. (2015). Cyber denial, deception and counter deception: a framework for supporting active cyber defense.
Jajodia, S., Subrahmanian, V. S., Swarup, V., & Wang, C. (2016). Cyber deception: building the scientific foundation.
See also
- Honeypot
- Advanced Persistent Threat
- Byzantine Foothold
- Stakkato
- Moonlight Maze
- Titan Rain
- Solar Sunrise
- Operation Aurora
- Stuxnet
- Moonlight Maze
- Computer Network Defense
- Information Warfare
- Computer network operations
- Asymmetric Dominance
- Sun Tzu 孫子
- The Art of War
- Carl von Clausewitz
- On War
- Cyberwarfare
References
- 1 2 3 "Reverse Deception Organized Cyber Threat Counter-Exploitation teaches you to debunk, pursue, and charge cyber attackers". Barnesandnoble.com. Retrieved 31 October 2016.
- ↑ "Identify, analyze, and block APTs". Barnesandnoble.com. Retrieved 31 October 2016.
- 1 2 3 4 "The intricate guide of detecting malicious code and decode the types of enemies they originate from". helpnetsecurity.com. 12 July 2012. Retrieved 31 October 2016.
- ↑ "Hack attacks hit Bitcoin exchange rates". bbc.com. 4 April 2013. Retrieved 22 November 2016.