Reverse Deception: Organized Cyber Threat Counter-Exploitation
Author | Sean Bodmer, Dr Max Kilger, Dr PH(c) Gregory Carpenter, and Jade Jones, JD[1] |
---|---|
Country | United States |
Language | English |
Series | Jack Reacher |
Genre | Cyber Security |
Publisher | McGraw-Hill Publishers |
Publication date | 24 July 2012[1] |
Media type | Paperback[2] |
Pages | 464 pp[1] |
ISBN | 978-0071772495 |
Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook by Sean Bodmer, Dr. Max Kilger, Dr. PH(c) Gregory Carpenter, and Jade Jones, JD about providing methods to rectify Advanced Persistent Threats.[3] It details how to identity APTs and prioritize actions through applying skilled field-tested private- and government-sector methods.[3] It also trains one to expose, pursue, and charge the creators of Advanced Persistent Threats.[3] Additionally, the authors explain and demonstrate how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The authors provide full coverage of legal and ethical issues; specifically, how an IT professional can approach a corporate lawyer and explain what they would like to do with implementing deceptive network options in a language the legal council will understand. Computer adversary profiling and counterintelligence techniques assist professionals and the book adds another dimension by rounding out with operational vetting, and security team management.
The book also covers a "theoretical" hack of the virtual currency, Bitcoin. The following year, Bitcoin was attacked and millions were stolen. [4]
Features inside book
Some of the features of the book are.[3]
- Figuring out the types of enemies threats derive from.
- Analysis of cyber espionage tactics seen in the United States and globally, with comparisons of type of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa.
- Uncover, eliminate, and autopsy crimeware, trojans, and botnets
- Cat-and-mouse approaches which explain how to use duplicity and disinformation techniques against incoming threats.
- Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
- How to distinguish the appearance of malicious code
- Identify, analyze, and block APTs
- Value Chain Management
- Counter espionage and espionage
- Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.
Authors
- Sean M. Bodmer, CISSP, CEH, is Chief Researcher of Counter-Exploitation Intelligence at CounterTack, Inc. a next generation endpoint security firm. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses around the world. He's the co-author of Hacking Exposed: Malware & Rootkits.
- Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intelligence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanford University in Social Psychology in 1993.
- Dr PH (c) Gregory Carpenter, CISM, is an Adjunct Professor at Northern Virginia CC & on the Board of Directors of ATNA Systems. He served at the Army Cyber Command, National Security Agency / Central Security Service, Joint Task Force for Global Network Operations and the Army Material Command. In his over 30 year military and civilian career with the Federal Government, he served in the Infantry, Logistics, Information Operations, Counterintelligence, Medical Service, Electronic Warfare and Military Intelligence branches. In 2007 he received the NSA Military Performer of the Year Award and is working the dissertation in his Dr of Public Health.
- Jade Jones, JD, has 15 years practice experience. Areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.
Referenced In Text
Heginbotham, E. (2015). The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017. Santa Monica, CA: RAND.
See also
- Honeypot
- Advanced Persistent Threat
- Byzantine Foothold
- Stakkato
- Moonlight Maze
- Titan Rain
- Solar Sunrise
- Operation Aurora
- Stuxnet
- Moonlight Maze
- Computer Network Defense
- Information Warfare
- Computer network operations
- Asymmetric Dominance
- Sun Tzu 孫子
- The Art of War
- Carl von Clausewitz
- On War
- Cyberwarfare
External links
References
- 1 2 3 "Reverse Deception Organized Cyber Threat Counter-Exploitation teaches you to debunk, pursue, and charge cyber attackers". Barnesandnoble.com. Retrieved 31 October 2016.
- ↑ "Identify, analyze, and block APTs". Barnesandnoble.com. Retrieved 31 October 2016.
- 1 2 3 4 "The intricate guide of detecting malicious code and decode the types of enemies they originate from". helpnetsecurity.com. 12 July 2012. Retrieved 31 October 2016.
- ↑ "Hack attacks hit Bitcoin exchange rates". bbc.com. 4 April 2013. Retrieved 22 November 2016.