Targeted cyber attacks : multi-staged attacks driven by exploits and malware /
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indis...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Syngress,
2014.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | SCIDIR_ocn876746646 | ||
003 | OCoLC | ||
005 | 20231120111550.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140415s2014 ne ob 000 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d IDEBK |d OPELS |d UKMGB |d E7B |d YDXCP |d OCLCO |d CDX |d B24X7 |d COO |d TPH |d OCLCA |d OCLCQ |d OCLCO |d DEBSZ |d VGM |d LIV |d OCLCQ |d SAV |d OCLCA |d REB |d OCLCO |d OCLCF |d U3W |d D6H |d LND |d CHVBK |d INT |d OTZ |d AU@ |d OCLCQ |d WYU |d OCLCO |d OCLCA |d VT2 |d OCLCO |d OCLCQ |d OCL |d OCLCO | ||
016 | 7 | |a 016724752 |2 Uk | |
016 | 7 | |a 016724862 |2 Uk | |
019 | |a 1026443332 |a 1065941456 |a 1103260508 |a 1129357354 |a 1152977834 |a 1192351175 |a 1235828935 |a 1240514131 |a 1262673448 | ||
020 | |a 9780128006191 |q (electronic bk.) | ||
020 | |a 0128006196 |q (electronic bk.) | ||
020 | |a 9781306583534 | ||
020 | |a 1306583535 | ||
020 | |z 9780128006047 | ||
020 | |z 0128006048 | ||
035 | |a (OCoLC)876746646 |z (OCoLC)1026443332 |z (OCoLC)1065941456 |z (OCoLC)1103260508 |z (OCoLC)1129357354 |z (OCoLC)1152977834 |z (OCoLC)1192351175 |z (OCoLC)1235828935 |z (OCoLC)1240514131 |z (OCoLC)1262673448 | ||
050 | 4 | |a TK5105.59 | |
060 | 4 | |a Online Book | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Sood, Aditya K., |e author. | |
245 | 1 | 0 | |a Targeted cyber attacks : |b multi-staged attacks driven by exploits and malware / |c Aditya K Sood, Richard Enbody. |
264 | 1 | |a Amsterdam ; |a Boston : |b Syngress, |c 2014. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
520 | |a Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively. A well-structured introduction into the world of targeted cyber-attacksIncludes analysis of real-world attacksWritten by cyber-security researchers and experts. | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Front Cover; Targeted Cyber Attacks; Copyright Page; A Few Words About Targeted Cyber Attacks; Contents; Acknowledgments; About the Authors; Overview; 1 Introduction; References; 2 Intelligence Gathering; 2.1 Intelligence Gathering Process; 2.2 OSINT, CYBINT, and HUMINT; 2.3 OSNs: A Case Study; References; 3 Infecting the Target; 3.1 Elements Used in Incursion; 3.2 Model A: Spear Phishing Attack: Malicious Attachments; 3.3 Model B: Spear Phishing Attack: Embedded Malicious Links; 3.4 Model C: Waterholing Attack; 3.5 Model D: BYOD as Infection Carriers: USB. | |
505 | 8 | |a 3.6 Model E: Direct Incursion: Network ExploitationReferences; 4 System Exploitation; 4.1 Modeling Exploits in Targeted Attacks; 4.2 Elements Supporting System Exploitation; 4.2.1 Browser Exploit Packs (BEPs); 4.2.2 Zero-Day Vulnerabilities and Exploits; 4.3 Defense Mechanisms and Existing Mitigations; 4.4 Anatomy of Exploitation Techniques; 4.4.1 Return-to-Libc Attacks; 4.4.2 Return-oriented Programming; 4.4.3 Attacking DEP and ASLR; 4.4.4 Digging Inside Info Leak Vulnerabilities; 4.5 Browser Exploitation Paradigm; 4.6 Drive-By Download Attack Model; 4.6.1 Compromising a Web Site/Domain. | |
505 | 8 | |a 4.6.2 Infecting a Web Site4.6.3 Hosting BEPs and Distributing Links; 4.6.4 Fingerprinting the User Environment; 4.6.5 Attacking Heap-Model of Exploitation; 4.6.6 Heap Spraying; 4.6.7 Heap Feng Shui/Heap Massage; 4.7 Stealth Malware Design and Tactics; 4.7.1 Hooking; 4.7.2 Bypassing Static and Dynamic Detection Mechanisms; References; 5 Data Exfiltration Mechanisms; 5.1 Phase 1: Data Gathering Mechanisms; 5.2 Phase 2: Data Transmission; References; 6 Maintaining Control and Lateral Movement; 6.1 Maintaining Control; 6.1.1 Deploying BackConnect Servers; 6.1.2 Local Privilege Escalation. | |
505 | 8 | |a 8 Challenges and Countermeasures8.1 Real-Time Challenges; 8.1.1 Persisting False Sense of Security; 8.1.2 Myths About Malware Infections and Protection; 8.2 Countermeasures and Future Developments; 8.2.1 Building a Strong Response Plan; 8.2.2 End System Security; 8.2.3 User Centric Security; 8.2.4 Network Level Security; 8.2.5 Security Assessment and Patch Management; 8.2.6 Next-generation Defenses; References; 9 Conclusion; References; Abbreviations. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Cyberspace |x Security measures. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer security. | |
650 | 1 | 2 | |a Computer Security |0 (DNLM)D016494 |
650 | 6 | |a R�eseaux d'ordinateurs |x S�ecurit�e |x Mesures. |0 (CaQQLa)201-0263812 | |
650 | 6 | |a S�ecurit�e informatique. |0 (CaQQLa)201-0061152 | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast |0 (OCoLC)fst02031378 | |
650 | 7 | |a Computer security |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Computer crimes |x Prevention |2 fast |0 (OCoLC)fst00872068 | |
650 | 7 | |a Computer networks |x Security measures |2 fast |0 (OCoLC)fst00872341 | |
700 | 1 | |a Enbody, Richard J., |e author. | |
776 | 0 | 8 | |i Print version: |t Targeted Cyber Attacks |z 9780128006047 |w (OCoLC)869777042 |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9780128006047 |z Texto completo |
856 | 4 | 1 | |u http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780128006047 |z Texto completo |