Request PDF on ResearchGate | Reverse Deception: Organized Cyber Threat Counter-Exploitation | Expose, pursue, and prosecute the perpetrators of. Reverse Deception: Organized Cyber Threat Counter-Exploitation [Sean Bodmer , Dr. Max Kilger, Gregory Carpenter, Jade Jones] on billpercompzulbe.cf *FREE*. Reverse Deception Organized Cyber Threat Counter Exploitation. Reverse Locate the existing reports of word, txt, kindle, ppt, zip, pdf, and rar in this.
|Language:||English, Spanish, Dutch|
|Distribution:||Free* [*Registration needed]|
Reverse Deception: Organized Cyber Threat Counter-Exploitation (July off by referencing Joint Publication Military Deception .pdf. Reverse Deception Organized Cyber Threat Counter Exploitation. Reverse in kindle, zip, pdf, ppt, rar, txt, and also word layout reports. So, you have. Ebook Reverse Deception Organized Cyber Threat Counter Exploitation currently billpercompzulbe.cf
Despite this misnomer, this book does provide a valuable introducti Reverse Deception is the second book from Sean Bodmer. Despite this misnomer, this book does provide a valuable introduction to APT.
The first chapter starts with the "current" state of cyber threats as of for this edition. Most of this chapter is spent listing some of the most popular cyber operations and malware groups, and providing a quick overview of what happened and how the author categorizes them. Chapter 2 covers the general idea of deception and uses Joint Publication Next the author gives examples of traditional deception and then relies on a typical tech manual crutch by providing the "Applying to Cyber" section to each category to try and relate physical warfare to cyber warfare.
While I understand the author is trying to tie in a complex logical concept into something more concrete, I would argue that the audience that picks this book up will be a little more apt at understanding the concepts without having to shoehorn in some crude analogies.
Next comes some history including the same "Applying to Cyber" section and then listing some better known "Maxims" of deception. Finally, some weird "Understanding the Information Picture" attempts to explain bias', optimism, and pessimism with some arbitrary, basic math.
Much of this chapter is common sense for a seasoned security expert. Below are my notes for each chapter.
The deception must target the adversary decision maker capable of taking the desired action s ; Objective: The deception must cause an adversary to take or not to take specific actions, not just believe certain things; Centralized planning: A deception operation requires careful timing and action; Integration: Fully integrate each military deception with the operation that it is supporting.
These principles are then explained in detail.
From p. Devices, Tools, and Techniques. Addison Wesley Professional pp. Boca Raton: Auerbach Publishing.
Rockland, MA: The chapter contains an excellent list of references at the end. Chapter 4: This chapter has another good list of references at the end. Step 1: Obtain a Financial Stream Victim: Chapter 9 uses the SpyEye trojan as another case study in classifying threats and to spell out various steps that were taken to detect this threat, and how the trojan works.
Funny enough, this chapter seems to be the directors cut of Damballa's blog post. From chapter 10 and on is the major selling point of the book.
Chapter 10 fills out Chapter 4 with more information about profiling, and delivers more information about actual cyber-intelligence to build profiles on attackers threatening organizations.
This is more of what I was expecting from the book. Being this far away from chapter 4 seems to be a disservice to the reader, but the intended audience might have needed all the extra information. Overall, this is a decent book to get someone who is brand new to cyber security up to functioning with a new team. It is not a fully captivating read, and I found it hard to continue on to the next paragraph some times.
For a seasoned security professionally who is getting more into APT, or joining an existing team, there are still good nuggets of information to be found but they will be able to skim through quite a few chapters.
If you are already breaking apart malware and doing analysis and tracking APT's, this book is below your level.