Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910460221703321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910787012103321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
Autore | Shimonski Robert |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (258 p.) |
Disciplina | 327.12 |
Soggetto topico |
Electronic intelligence
Internet in espionage Cyber intelligence (Computer security) Internet - Security measures Computer crimes |
ISBN | 0-12-801468-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods Protect Yourself! |
Record Nr. | UNINA-9910829064003321 |
Shimonski Robert | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber threats from China, Russia, and Iran : protecting American critical infrastructure : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, March 20, 2013 |
Pubbl/distr/stampa | Washington : , : U.S. Government Printing Office, , 2013 |
Descrizione fisica | 1 online resource (iii, 45 pages) : illustrations |
Soggetto topico |
Cyberterrorism - China
Cyberterrorism - Russia (Federation) Cyberterrorism - Iran Cyberterrorism - United States - Prevention Cyberspace - Security measures - United States Cyberinfrastructure - Security measures - United States Computer networks - Security measures - United States Internet in espionage |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber threats from China, Russia, and Iran |
Record Nr. | UNINA-9910704999103321 |
Washington : , : U.S. Government Printing Office, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity, terrorism, and beyond : addressing evolving threats to the homeland : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, second session, September 10, 2014 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2015 |
Descrizione fisica | 1 online resource (iii, 95 pages) : illustrations |
Collana | S. hrg. |
Soggetto topico |
Cyberterrorism - United States - Prevention
Cyberinfrastructure - Security measures - United States Computer networks - Security measures - United States Computer security - United States Internet in espionage Cyber intelligence (Computer security) - United States National security - United States |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cybersecurity, terrorism, and beyond |
Record Nr. | UNINA-9910698619103321 |
Washington : , : U.S. Government Publishing Office, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Grizzly steppe : Russian malicious cyber activity |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Department of Homeland Security, NCCIC : , : Department of Justice, Federal Bureau of Investigation, , 2016 |
Descrizione fisica | 1 online resource (13 pages) : color illustrations |
Soggetto topico |
Espionage, Russian - United States
Internet in espionage Computer security - United States Computer networks - Security measures - United States Cyberterrorism - United States - Prevention Cyberterrorism - Russia (Federation) Hacking - Prevention Computer crimes - Prevention |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Grizzly steppe |
Record Nr. | UNINA-9910707821303321 |
[Washington, D.C.] : , : U.S. Department of Homeland Security, NCCIC : , : Department of Justice, Federal Bureau of Investigation, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inquiry into cyber intrusions affecting U.S. Transportation Command contractors : report of the Committee on Armed Services, United States Senate |
Pubbl/distr/stampa | Washington : , : U.S. Government Printing Office, , 2014 |
Descrizione fisica | 1 online resource (x, 34 pages) : illustrations |
Collana | Report / 113th Congress, 2d session, Senate |
Soggetto topico |
Government contractors - United States
Cyber intelligence (Computer security) - United States Defense contracts - Data processing - Security measures - United States Computer networks - Security measures - United States Cyberterrorism - United States Internet in espionage |
Soggetto genere / forma | Legislative materials. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Inquiry into cyber intrusions affecting U.S. Transportation Command contractors |
Record Nr. | UNINA-9910702651403321 |
Washington : , : U.S. Government Printing Office, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / / Bryan Krekel, Patton Adams, George Bakos |
Autore | Krekel Bryan A. |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S.-China Economic and Security Review Administration, , 2012 |
Descrizione fisica | 1 online resource (136 pages) |
Soggetto topico |
Cyberspace - Government policy - China
Computer crimes - China Cyberterrorism - China Information warfare - China Internet in espionage - China Telecommunication - Research - China Computer crimes Cyberspace - Government policy Cyberterrorism Information technology Information warfare Internet in espionage Telecommunication - Research |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Occupying the information high ground |
Record Nr. | UNINA-9910716668903321 |
Krekel Bryan A. | ||
[Washington, D.C.] : , : U.S.-China Economic and Security Review Administration, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Task force on cyber deterrence / / Department of Defense Science Board |
Pubbl/distr/stampa | Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2017 |
Descrizione fisica | 1 online resource (i, 36 pages) |
Soggetto topico |
Cyberspace - Security measures - United States
Information warfare Internet in espionage National security - United States Cyberterrorism - United States - Prevention Computer networks - Security measures - United States Military planning - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Final Report of the Defense Science Board (DSB) Task Force on cyber deterrence |
Record Nr. | UNINA-9910708089503321 |
Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Task force report : resilient military systems and the advanced cyber threat / / Department of Defense Science Board |
Pubbl/distr/stampa | Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2013 |
Descrizione fisica | 1 online resource (vi, 138 pages) : color illustrations |
Soggetto topico |
Cyberspace - Security measures - United States
Information warfare Internet in espionage National security - United States Cyberterrorism - United States - Prevention Computer networks - Security measures - United States Military planning - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Task force report |
Record Nr. | UNINA-9910702417603321 |
Washington, D.C . : , : Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|