0
نام کتاب
Attribution of Advanced Persistent Threats

How to Identify the Actors Behind Cyber-Espionage

Timo Steffens

Paperback207 Pages
PublisherSpringer
Edition1
LanguageEnglish
Year2020
ISBN9783662613122
527
A5489
انتخاب نوع چاپ:
جلد سخت
499,000ت
0
جلد نرم
419,000ت
0
طلق پاپکو و فنر
429,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Threats

#Cyber-Espionage

#Cyber-attacks

#Malware

توضیحات

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension.


Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.


This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.


Part I Introduction

1 Advanced Persistent Threats

2 The Attribution Process

Part II Attribution Methods

3 Analysis of Malware

4 Attack Infrastructure

5 Analysis of Control Servers

6 Geopolit ical Analysis

7 Telemetry- Data from Security Products

8 Methods of Intelligence Agencies

9 Doxing

10 False Flags

11 Group Set-Ups

Part Ill Strategical Aspects

12 Communication

13 Ethics of Attribution

14 Conclusion and Outlook


About the Author

Timo Steffens was involved in the analysis of many of the most spectacular cyber-espionage cases in Germany. He has been tracking the activities and techniques of sophisticated hacker groups for almost a decade.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
598
Cybersecurity Tabletop Exercises
414,000 تومان
هک و امنیت
1,208
Mastering Malware Analysis
1,141,000 تومان
Software Development
979
Security Chaos Engineering
688,000 تومان
هک و امنیت
1,208
Hands-On Bug Hunting for Penetration Testers
506,000 تومان
هک و امنیت
1,177
The Database Hacker's Handbook
975,000 تومان
GO
1,220
Security with Go
577,000 تومان
هک و امنیت
969
Phishing and Communication Channels
446,000 تومان
هک و امنیت
711
The Business of Hacking
554,000 تومان
+Security
1,305
CompTIA Security+
1,438,000 تومان
هک و امنیت
1,075
CEH v11: Certified Ethical Hacker Version 11 Practice Tests
424,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©