Cargando…

Cyber adversary characterization : auditing the hacker mind /

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Parker, Tom, 1982-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, [2004]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.