Cargando…

Targeted cyber attacks : multi-staged attacks driven by exploits and malware /

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indis...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Sood, Aditya K. (Autor), Enbody, Richard J. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, 2014.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn876746646
003 OCoLC
005 20231120111550.0
006 m o d
007 cr cnu---unuuu
008 140415s2014 ne ob 000 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d OPELS  |d UKMGB  |d E7B  |d YDXCP  |d OCLCO  |d CDX  |d B24X7  |d COO  |d TPH  |d OCLCA  |d OCLCQ  |d OCLCO  |d DEBSZ  |d VGM  |d LIV  |d OCLCQ  |d SAV  |d OCLCA  |d REB  |d OCLCO  |d OCLCF  |d U3W  |d D6H  |d LND  |d CHVBK  |d INT  |d OTZ  |d AU@  |d OCLCQ  |d WYU  |d OCLCO  |d OCLCA  |d VT2  |d OCLCO  |d OCLCQ  |d OCL  |d OCLCO 
016 7 |a 016724752  |2 Uk 
016 7 |a 016724862  |2 Uk 
019 |a 1026443332  |a 1065941456  |a 1103260508  |a 1129357354  |a 1152977834  |a 1192351175  |a 1235828935  |a 1240514131  |a 1262673448 
020 |a 9780128006191  |q (electronic bk.) 
020 |a 0128006196  |q (electronic bk.) 
020 |a 9781306583534 
020 |a 1306583535 
020 |z 9780128006047 
020 |z 0128006048 
035 |a (OCoLC)876746646  |z (OCoLC)1026443332  |z (OCoLC)1065941456  |z (OCoLC)1103260508  |z (OCoLC)1129357354  |z (OCoLC)1152977834  |z (OCoLC)1192351175  |z (OCoLC)1235828935  |z (OCoLC)1240514131  |z (OCoLC)1262673448 
050 4 |a TK5105.59 
060 4 |a Online Book 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Sood, Aditya K.,  |e author. 
245 1 0 |a Targeted cyber attacks :  |b multi-staged attacks driven by exploits and malware /  |c Aditya K Sood, Richard Enbody. 
264 1 |a Amsterdam ;  |a Boston :  |b Syngress,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively. A well-structured introduction into the world of targeted cyber-attacksIncludes analysis of real-world attacksWritten by cyber-security researchers and experts. 
504 |a Includes bibliographical references. 
505 0 |a Front Cover; Targeted Cyber Attacks; Copyright Page; A Few Words About Targeted Cyber Attacks; Contents; Acknowledgments; About the Authors; Overview; 1 Introduction; References; 2 Intelligence Gathering; 2.1 Intelligence Gathering Process; 2.2 OSINT, CYBINT, and HUMINT; 2.3 OSNs: A Case Study; References; 3 Infecting the Target; 3.1 Elements Used in Incursion; 3.2 Model A: Spear Phishing Attack: Malicious Attachments; 3.3 Model B: Spear Phishing Attack: Embedded Malicious Links; 3.4 Model C: Waterholing Attack; 3.5 Model D: BYOD as Infection Carriers: USB. 
505 8 |a 3.6 Model E: Direct Incursion: Network ExploitationReferences; 4 System Exploitation; 4.1 Modeling Exploits in Targeted Attacks; 4.2 Elements Supporting System Exploitation; 4.2.1 Browser Exploit Packs (BEPs); 4.2.2 Zero-Day Vulnerabilities and Exploits; 4.3 Defense Mechanisms and Existing Mitigations; 4.4 Anatomy of Exploitation Techniques; 4.4.1 Return-to-Libc Attacks; 4.4.2 Return-oriented Programming; 4.4.3 Attacking DEP and ASLR; 4.4.4 Digging Inside Info Leak Vulnerabilities; 4.5 Browser Exploitation Paradigm; 4.6 Drive-By Download Attack Model; 4.6.1 Compromising a Web Site/Domain. 
505 8 |a 4.6.2 Infecting a Web Site4.6.3 Hosting BEPs and Distributing Links; 4.6.4 Fingerprinting the User Environment; 4.6.5 Attacking Heap-Model of Exploitation; 4.6.6 Heap Spraying; 4.6.7 Heap Feng Shui/Heap Massage; 4.7 Stealth Malware Design and Tactics; 4.7.1 Hooking; 4.7.2 Bypassing Static and Dynamic Detection Mechanisms; References; 5 Data Exfiltration Mechanisms; 5.1 Phase 1: Data Gathering Mechanisms; 5.2 Phase 2: Data Transmission; References; 6 Maintaining Control and Lateral Movement; 6.1 Maintaining Control; 6.1.1 Deploying BackConnect Servers; 6.1.2 Local Privilege Escalation. 
505 8 |a 8 Challenges and Countermeasures8.1 Real-Time Challenges; 8.1.1 Persisting False Sense of Security; 8.1.2 Myths About Malware Infections and Protection; 8.2 Countermeasures and Future Developments; 8.2.1 Building a Strong Response Plan; 8.2.2 End System Security; 8.2.3 User Centric Security; 8.2.4 Network Level Security; 8.2.5 Security Assessment and Patch Management; 8.2.6 Next-generation Defenses; References; 9 Conclusion; References; Abbreviations. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Computer security. 
650 1 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures  |2 fast  |0 (OCoLC)fst02031378 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computer crimes  |x Prevention  |2 fast  |0 (OCoLC)fst00872068 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Enbody, Richard J.,  |e author. 
776 0 8 |i Print version:  |t Targeted Cyber Attacks  |z 9780128006047  |w (OCoLC)869777042 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128006047  |z Texto completo 
856 4 1 |u http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780128006047  |z Texto completo