Cargando…

Predicting Malicious Behavior : Tools and Techniques for Ensuring Global Security.

A groundbreaking exploration of how to identify and fight security threats at every levelThis revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jackson, Gary M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, 2012.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Predicting Malicious Behavior; Contents; Foreword; Introduction; Part I Understanding the Dark Side: Malicious Intent; Chapter 1 Analyzing the Malicious Individual; Analyzing the Unique Individual; Richard Reid: The Shoe Bomber; The Event; The Motivation; Causes; A Behavior Analysis; Ted Bundy: The Infamous Serial Murderer; Similarities of Targets; The Motivation; Determining the Complexities Underlying Individual Malicious Behavior: A Behavior Analysis; Removing Subjectivity and Bias from the Behavior Analysis; The Individual Cyber Attacker.
  • Identifying the Threat from the Lone Cyber AttackerRecognizing the Power of Being Anonymous; Recognizing When a Hacker Is Detached from the Target; Recognizing Motivation; Identifying the Power of Disruption; Recognizing the Need for Theft; A Behavior Analysis; Modeling the Individual: Advantages and Disadvantages; How Individuals May Vary; The Loner; The Chameleon; The Social Misfit; The Individual versus the Group; Advantages of AuBA #1: Automated Summarization; In Summary; Chapter 2 Analyzing the Malicious Group; Understanding the Group Adversary; Analyzing al-Qaeda.
  • Automated Behavior Analysis SummaryThe Organization; Group Dynamics; The Motivation; Declarations of War; A Behavior Analysis; Analyzing Hezbollah; The Organization; Consistency of Behavior; The Motivation; Targeting Consistency; A Behavior Analysis; Analyzing the Coordinated Group Cyber Threat; The Group Structure; The Motivation; A Behavior Analysis; Advantages of AuBA #2: Theme-Guided Smart Searches; In Summary; Chapter 3 Analyzing Country-Level Threats; Threats to Our National Infrastructure; Analyzing the Specific Threat of Terrorist Attacks.
  • Current Terrorist Threats to the United StatesPreventing Terrorist Attacks on U.S. Soil; Improving Network Security; Current Network Security; Current Foreign Threats to Network Security; Understanding Current Technology for Protecting Our Networks; Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats; Understanding the Threat of a Biological Attack; Anticipating the Dirty Bomb; Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling; In Summary; Chapter 4 Threats and Security Nightmares: Our Current Reactive State of Security.
  • Analyzing Mall, School, Workplace, and Other Seemingly Random Public ViolenceMaking Sense of Seemingly Senseless Public Attacks; Why Are We Violent?; Unanticipated Terrorist Network Attacks; Understanding the Element of Surprise; Anticipating the Unknown; Can Technology Detect First-Time Attacks?; Detecting the New Attack; Advantages of AuBA #4: Building Predictive Applications; In Summary; Chapter 5 Current Network Security; Hacking and National Network Security; Growing Damage and Threat; Assessing Current Technology; Signature Detection.