Chargement en cours…

Cyber adversary characterization : auditing the hacker mind /

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Autres auteurs: Parker, Tom, 1982-
Format: Électronique eBook
Langue:Inglés
Publié: Rockland, MA : Syngress, [2004]
Sujets:
Accès en ligne:Texto completo
Table des matières:
  • Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.