The use of and reliance upon computers and the Internet has become widespread in recent years. As a result, the world is now faced with an increased risk of cybercrime. The information in "Cyber Adversary Characterization" will show security and cyber-terrorist specialists how to develop a well-designed plan to combat hackers. The book will unveil how much you may or--more importantly--may not know about the types of adversaries that are out there. "Cyber Adversary Characterization" is essential for those who want to ensure a secure a network.
Andrew Williams, Vice President, Syngress Publishing, said, "We all know that cybercrime has become an all too real threat--from a 'hacktivist' concerned with worldly politics and agendas, to a script kiddie looking for a little fun, criminal hackers are as varied as they are skilled. Recognizing and understanding these adversaries and the potential threats they pose is key to securing any network. Cyber Adversary Characterization answers the questions: Who are the hackers?, What do they want to hack?, and Why they want to hack it?"
The authors of the book are Tom Parker, Matthew Devost, Marcus Sachs, Eric Shaw, and Ed Stroz.
"By providing recent case studies and profiles of various cyber-terrorists, this is the must-have guide book for understanding the world of hackers," said Ed Stroz, President of Stroz Friedberg, LLC. "Based on our real-life experience, we provide the tools for readers to recognize who or what is a cyber adversary and offer the best protection against them."
Chapter topics include: Disclosure and the Cyber Food Chain; Rating the Attack: Post-Incident Characterization Metrics; Asset Threat Characterization; Managing the Insider Threat; The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures; Characterizing the Extremes-Terrorists and Nation States; and Return on Investment.
"Cyber Adversary Characterization" is now available in bookstores and at online retailers.
PRICE: $49.95 U.S.
PAGE COUNT: 358 PP
About the Authors
Tom Parker is one of Britain's most highly prolific security consultants. In addition to providing integral security services for some of the world's largest organizations, Tom is widely known for his vulnerability research on a wide range of platforms and commercial products. His more recent technical work includes the development of an embedded operating system, media management system and cryptographic code for use on digital video band (DVB) routers.
Matthew G. Devost is President and CEO of the Terrorism Research Center, Inc., overseeing all research, analysis and training programs. He has been researching the impact of information technology on national security since 1993. Matthew is certified in the National Security Agency's INFOSEC Assessment Methodology and is an instructor for the Threat, Exposure and Response Matrix (TERM) methodology. He has appeared on CNN, MSNBC, FoxNews, NPR, CBS Radio, BBC television, and NWCN.
Marcus H. Sachs is the Director of the SANS Internet Storm Center and is a cyberspace security researcher, writer, and instructor for the SANS Institute. He previously served in the White House Office of Cyberspace Security and was a staff member of the President's Critical Infrastructure Protection Board. While a member of the White House staff, Marcus coordinated efforts to protect and secure the nation's telecommunication and Internet infrastructures, leveraging expertise from United States government agencies, the domestic private sector, and the international community. He also contributed to the National Strategy to Secure Cyberspace, upon his joining of the National Cyber Security Division of the US Department of Homeland Security.
Eric Shaw is a clinical psychologist who has spent the last 20 years specializing in the psychological profiling of political actors and forensic subjects. He has provided cross-cultural profiling for the U.S. government on the psychological state and political attitudes of figures such as Saddam Hussein, Iranian revolutionary leaders under Khomeini, senior Soviet military commanders, as well as Yugoslav, Laotian, Cuban and other military and political leaders.
Ed Stroz is President of Stroz Friedberg, LLC, which he started in 2000 after a sixteen-year career as a Special Agent for the Federal Bureau of Investigation. Stroz Friedberg performs investigative, consulting, and forensic laboratory services for major law firms and large corporations. In 1996, he formed the FBI's Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial-of-service attacks, illegal Internet wiretapping, fraud, money laundering, and violations of intellectual property rights, including trade secrets. Among the more significant FBI investigations Ed handled were Vladimir Levin's prosecution for hacking a US bank from Russia and the hack against the "New York Times" web site.
Syngress Publishing (www.syngress.com), headquartered in Rockland, Massachusetts, is an independent publisher of print and electronic reference materials for Information Technology professionals seeking skill enhancement and career advancement. Distributed throughout Europe, Asia, the U.S. and Canada, Syngress titles have been translated into twenty languages. The company's pioneering customer support program, firstname.lastname@example.org, extends the value of every Syngress title with regular information updates and customer-driven author forums. For more information on Syngress products, contact Amy Pedersen at 781-681-5151 or email email@example.com. Syngress books are distributed in the United States and Canada by O'Reilly Media Inc.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.