Predicting Malicious Behavior : Tools and Techniques for Ensuring Global Security.
A groundbreaking exploration of how to identify and fight security threats at every levelThis revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken :
John Wiley & Sons,
2012.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Predicting Malicious Behavior; Contents; Foreword; Introduction; Part I Understanding the Dark Side: Malicious Intent; Chapter 1 Analyzing the Malicious Individual; Analyzing the Unique Individual; Richard Reid: The Shoe Bomber; The Event; The Motivation; Causes; A Behavior Analysis; Ted Bundy: The Infamous Serial Murderer; Similarities of Targets; The Motivation; Determining the Complexities Underlying Individual Malicious Behavior: A Behavior Analysis; Removing Subjectivity and Bias from the Behavior Analysis; The Individual Cyber Attacker.
- Identifying the Threat from the Lone Cyber AttackerRecognizing the Power of Being Anonymous; Recognizing When a Hacker Is Detached from the Target; Recognizing Motivation; Identifying the Power of Disruption; Recognizing the Need for Theft; A Behavior Analysis; Modeling the Individual: Advantages and Disadvantages; How Individuals May Vary; The Loner; The Chameleon; The Social Misfit; The Individual versus the Group; Advantages of AuBA #1: Automated Summarization; In Summary; Chapter 2 Analyzing the Malicious Group; Understanding the Group Adversary; Analyzing al-Qaeda.
- Automated Behavior Analysis SummaryThe Organization; Group Dynamics; The Motivation; Declarations of War; A Behavior Analysis; Analyzing Hezbollah; The Organization; Consistency of Behavior; The Motivation; Targeting Consistency; A Behavior Analysis; Analyzing the Coordinated Group Cyber Threat; The Group Structure; The Motivation; A Behavior Analysis; Advantages of AuBA #2: Theme-Guided Smart Searches; In Summary; Chapter 3 Analyzing Country-Level Threats; Threats to Our National Infrastructure; Analyzing the Specific Threat of Terrorist Attacks.
- Current Terrorist Threats to the United StatesPreventing Terrorist Attacks on U.S. Soil; Improving Network Security; Current Network Security; Current Foreign Threats to Network Security; Understanding Current Technology for Protecting Our Networks; Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats; Understanding the Threat of a Biological Attack; Anticipating the Dirty Bomb; Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling; In Summary; Chapter 4 Threats and Security Nightmares: Our Current Reactive State of Security.
- Analyzing Mall, School, Workplace, and Other Seemingly Random Public ViolenceMaking Sense of Seemingly Senseless Public Attacks; Why Are We Violent?; Unanticipated Terrorist Network Attacks; Understanding the Element of Surprise; Anticipating the Unknown; Can Technology Detect First-Time Attacks?; Detecting the New Attack; Advantages of AuBA #4: Building Predictive Applications; In Summary; Chapter 5 Current Network Security; Hacking and National Network Security; Growing Damage and Threat; Assessing Current Technology; Signature Detection.