LEADER 05634nam 2200721 450 001 9910131512403321 005 20200520144314.0 010 $a1-118-98723-3 010 $a1-119-18344-8 010 $a1-118-98708-X 035 $a(CKB)3710000000443965 035 $a(EBL)1895189 035 $a(SSID)ssj0001568608 035 $a(PQKBManifestationID)16217273 035 $a(PQKBTitleCode)TC0001568608 035 $a(PQKBWorkID)14836443 035 $a(PQKB)11116206 035 $a(Au-PeEL)EBL4040351 035 $a(CaPaEBR)ebr11113576 035 $a(CaONFJC)MIL812240 035 $a(OCoLC)913742234 035 $a(CaSebORM)9781118987124 035 $a(MiAaPQ)EBC4040351 035 $a(PPN)194577546 035 $a(EXLCZ)993710000000443965 100 $a20151109h20152015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNetwork attacks & exploitation $ea framework /$fMatthew Monte 205 $a1st edition 210 1$aIndianapolis, Indiana :$cWiley,$d2015. 210 4$dİ2015 215 $a1 online resource (219 p.) 300 $aDescription based upon print version of record. 311 $a1-118-98712-8 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Contents; Introduction; Chapter 1 Computer Network Exploitation; Operations; Operational Objectives; Strategic Collection; Directed Collection; Non-Kinetic Computer Network Attack (CNA); Strategic Access; Positional Access; CNE Revisited; A Framework for Computer Network Exploitation; First Principles; Principles; Themes; Summary; Chapter 2 The Attacker; Principle of Humanity; Life Cycle of an Operation; Stage 1: Targeting; Stage 2: Initial Access; Stage 3: Persistence; Stage 4: Expansion; Stage 5: Exfiltration; Stage 6: Detection; Principle of Access 327 $aInbound AccessOutbound Access; Bidirectional Access; No Outside Access; Access Summary; Principle of Economy; Time; Targeting Capabilities; Exploitation Expertise; Networking Expertise; Software Development Expertise; Operational Expertise; Operational Analysis Expertise; Technical Resources; Economy Summary; Attacker Structure; Summary; Chapter 3 The Defender; Principle of Humanity; Humanity and Network Layout; Humanity and Security Policy; Principle of Access; The Defensive Life Cycle; Principle of Economy; The Helpful Defender; Summary; Chapter 4 Asymmetries; False Asymmetries 327 $aAdvantage AttackerMotivation; Initiative; Focus; Effect of Failure; Knowledge of Technology; Analysis of Opponent; Tailored Software; Rate of Change; Advantage Defender; Network Awareness; Network Posture; Advantage Indeterminate; Time; Efficiency; Summary; Chapter 5 Attacker Frictions; Mistakes; Complexity; Flawed Attack Tools; Upgrades and Updates; Other Attackers; The Security Community; Bad Luck; Summary; Chapter 6 Defender Frictions; Mistakes; Flawed Software; Inertia; The Security Community; Complexity; Users; Bad Luck; Summary; Chapter 7 Offensive Strategy; Principle 1: Knowledge 327 $aMeasuring KnowledgePrinciple 2: Awareness; Measuring Awareness; Principle 3: Innovation; Measuring Innovation; Defensive Innovation; Principle 4: Precaution; Measuring Precaution; Principle 5: Operational Security; Minimizing Exposure; Minimizing Recognition; Controlling Reaction; Measuring Operational Security; Principle 6: Program Security; Attacker Liabilities; Program Security Costs; Measuring Program Security; Crafting an Offensive Strategy; Modular Frameworks; A Note on Tactical Decisions; Summary; Chapter 8 Defensive Strategy; Failed Tactics; Antivirus and Signature-Based Detection 327 $aPassword PoliciesUser Training; Crafting a Defensive Strategy; Cloud-Based Security; Summary; Chapter 9 Offensive Case Studies; Stuxnet; Access; Economy; Humanity; Knowledge; Awareness; Precaution; Innovation; Operational Security; Program Security; Stuxnet Summary; Flame; Gauss; Dragonfly; Red October; APT1; Axiom; Summary; Epilogue; Appendix Attack Tools; Antivirus Defeats; Audio/Webcam Recording; Backdoor; Bootkit; Collection Tools; Exploits; Fuzzer; Hardware-based Trojan; Implant; Keystroke Logger; Network Capture; Network Survey; Network Tunnel; Password Dumpers and Crackers; Packer 327 $aPersistence Mechanism 330 $aIncorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aComputer security 606 $aComputer crimes$xPrevention 606 $aCorporations$xSecurity measures 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aComputer crimes$xPrevention. 615 0$aCorporations$xSecurity measures. 676 $a658.478 700 $aMonte$b Matthew$0973789 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910131512403321 996 $aNetwork attacks & exploitation$92216291 997 $aUNINA