Cybercrime and espionage an analysis of subversive multivector threats

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which t...

Descripción completa

Detalles Bibliográficos
Autor principal: Gragido, Will (-)
Otros Autores: Pirc, John, Rogers, Russ
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam : Elsevier 2011.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628075606719
Tabla de Contenidos:
  • Front Cover; Cybercrime and Espionage An Analysis of SubversiveMultivector Threats; Copyright; Contents; Foreword; Preface; Acknowledgements; About the authors; Chapter 1: Cybercrime and Espionage and the New Security 101; Introduction; He Who Does Not Prevent a Crime When He Can, Encourages It; What's Old Is New Again; A Changing World; Cybercriminal Statistics: U.S. and Abroad; The Statistics of Cybercrime; Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals; Trends in 2011; Myopic to the Catastrophic: Advanced Persistent Threats
  • Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and EspionageAgendas in Next Generation Cybercriminal Activity; The Coming Decade; Summary; Chapter 2: Evolution Revolution; Introduction; Communication; Criminal Activity; Summary; Chapter 3:The Silent Killer: HowRegulatory ComplianceHas Worsened the Stateof Information Security; Introduction; Regulatory Compliance Telemetry; Transborder Data Flow Restrictions; ISO Security Standards; Health Insurance Portability and Accountability Act (HIPAA); Family Education Rights and Privacy Act (FERPA)
  • Payment Card Industry Data Security Standard (PCI DSS)North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP); Summary; References; Chapter 4: Mediating The Great Divorce : The convergenceof Physical andLogical Security; Introduction; The CISSP Physical Security Domains; Environmental Security; The Silos of Security; Two-Factor Authentication; Converging the Great Physical Divide; Physical Device Security (Cryptography); Proximity-Based Access Control; Summary; References
  • Chapter 5: Nonstate Sponsored Attacks: Tealing Information is OurBusiness. . . And Business is GoodIntroduction; Asymmetric Forms of Information Gathering; Blended Reconnaissance; Social Engineering and Social Networking; Point, Click, and Own; Summary; References; Chapter 6: State-Sponsored Intelligence; Introduction; Espionage and Its Influence on Next-Generation Threats; Intelligence Types; Traditional Forms of Intelligence Gathering; Summary; Chapter 7: Cyber X: CriminalSyndicates, Nation States,Subnational Entities, andBeyond; Introduction; Classifying the Cyber Actor
  • Attack Sophistication ModelModus Operandi; The Importance of Attribution; Criminal and Organized Syndicates; Nation States; Subnational Entities; Summary; References; Chapter 8: The Rise of the Subversive Multivector Threat; Introduction; Sun Tzu and The Art of War; Defining the Subversive Multivector Threat (SMT); Summary; Chapter 9: Seven Commonalities of Subversive Multivector Threats; Introduction; Seven Commonalities of Subversive Multivector Threats; Five Names in Threats You Should Know; Next-Generation Techniques and Tools for Avoidance and Obfuscation; Summary; References
  • Chapter 10: Examples of Compromise and Presence of Subversive Multivector Threats