Reverse Deception by Bodmer
Organized Cyber Threat Counter-Exploitation

No critic rating

Waiting for minimum critic reviews

See Reader Rating

Synopsis

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management.

Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement
 

About Bodmer

See more books from this Author
Sean M. Bodmer, CISSP, CEH, is a senior threat intelligenSean M. Bodmer, CISSP, CEH, is a senior threat intelligence analyst at Damballa, Inc., a crimeware detection, securitce analyst at Damballa, Inc., a crimeware detection, security provider, and research firm consulting to Fortune 500 and y provider, and research firm consulting to Fortune 500 and 1,000 companies. He analyzes and tracks thousands of strings1,000 companies. He analyzes and tracks thousands of strings of network activity each week, scanning for malicious activ of network activity each week, scanning for malicious activity and focuses on attribution of each criminal and campaignity and focuses on attribution of each criminal and campaign. Sean is a frequent speaker on network security concepts an. Sean is a frequent speaker on network security concepts and practices, including at DoD conferences, and has been invid practices, including at DoD conferences, and has been invited to speak and train cyber counterintelligence courses aroted to speak and train cyber counterintelligence courses around the world. He's the co-author of "Hacking Exposed: Malwaund the world. He's the co-author of "Hacking Exposed: Malware & Rootkits". Max Kilger, Ph.D., is specialist in profire & Rootkits". Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and ling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, ishackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their currently on their board of directors, and serves as their chief membership officer and chief profiler. Dr. Kilger is achief membership officer and chief profiler. Dr. Kilger is a frequent national and international speaker to the intellig frequent national and international speaker to the intelligence community, military, federal law enforcement, and inforence community, military, federal law enforcement, and information security forums. He received his doctorate from Stanfmation security forums. He received his doctorate from Stanford University in Social Psychology in 1993. Gregory Carpord University in Social Psychology in 1993. Gregory Carpenter, CISM, has earned numerous professional awards includienter, CISM, has earned numerous professional awards including the Joint Task Force for Global Network Operations Officeng the Joint Task Force for Global Network Operations Officer of the Quarter, recognition in the Who's Who in Internatior of the Quarter, recognition in the Who's Who in International Business, and serves on the U.S. Government's Cross Domanal Business, and serves on the U.S. Government's Cross Domain Solution Working Group, the Joint Wireless Working Group,in Solution Working Group, the Joint Wireless Working Group, and many others. Jade Jones, JD, has 15 years practice e and many others. Jade Jones, JD, has 15 years practice experience. Areas of expertise include Information Operationsxperience. Areas of expertise include Information Operations and Space Law. He is a civilian with the Department of Defe and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves. nse and a Navy JAG Commander in the Reserves.
 
Published July 24, 2012 by McGraw-Hill Osborne Media. 464 pages
Genres: Computers & Technology. Non-fiction

Reader Rating for Reverse Deception
85%

An aggregated and normalized score based on 12 user ratings from iDreamBooks & iTunes


Rate this book!

Add Review
×