Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Dedication
About the Author
Foreword
Acknowledgments
Introduction
About This Book
A Note on the Castle Theory Thought Exercises
For Future Use
A Ninja Primer
The Historical Ninja
The Ninja Scrolls
Ninja Philosophy
Ninja Techniques
Chapter 1: Mapping Networks
Understanding Network Maps
Collecting Intelligence Undetected
Creating Your Map
Recommended Security Controls and Mitigations
Debrief
Chapter 2: Guarding with Special Care
Understanding Attack Vectors
The Concept of Guarding
Guarding Within a Cybersecurity Framework
Threat Modeling
Using Threat Modeling to Find Potential Attack Vectors
Recommended Security Controls and Mitigations
Debrief
Chapter 3: Xenophobic Security
Understanding Anti-Privilege
The Problem with Interoperability and Universal Standards
Developing Unique Characteristics for Your Environment
Recommended Security Controls and Mitigations
Debrief
Chapter 4: Identification Challenge
Understanding Authentication
Developing Matched-Pair Authenticators
Recommended Security Controls and Mitigations
Debrief
Chapter 5: Double-Sealed Password
A Concealed 2-Step Authentication
Developing Double-Sealed Passwords
Recommended Security Controls and Mitigations
Debrief
Chapter 6: Hours of Infiltration
Understanding Time and Opportunities
Developing Time-Based Security Controls and Anomaly Detectors
Recommended Security Controls and Mitigations
Debrief
Chapter 7: Access to Time
The Importance of Time
Keeping Time Confidential
Determine Your Baseline
Assess Technical Capability
Establish Policy
Recommended Security Controls and Mitigations
Debrief
Chapter 8: Tools
Living Off the Land
Securing Tools
Recommended Security Controls and Mitigations
Debrief
Chapter 9: Sensors
Identifying and Detecting Threats with Sensors
Better Sensors
Recommended Security Controls and Mitigations
Debrief
Chapter 10: Bridges and Ladders
Network Boundary Bridging
Countering Bridges
Recommended Security Controls and Mitigations
Debrief
Chapter 11: Locks
Physical Security
Improving Locks
Recommended Security Controls and Mitigations
Debrief
Chapter 12: Moon on the Water
Social Engineering
Defenses Against Social Engineering
Recommended Security Controls and Mitigations
Debrief
Chapter 13: Worm Agent
Insider Threats
A New Approach to Insider Threats
Recommended Security Controls and Mitigations
Debrief
Chapter 14: Ghost on the Moon
Implants
Protections from Implants
Recommended Security Controls and Mitigations
Debrief
Chapter 15: The Art of the Fireflies
Attribution
Approaches to Handling Attribution
Recommended Security Controls and Mitigations
Debrief
Chapter 16: Live Capture
Live Analysis
Confronting Live Threats
Recommended Security Controls and Mitigations
Debrief
Chapter 17: Fire Attack
Destructive Cyber Attacks
Safeguards from (Cyber) Fire Attacks
Recommended Security Controls and Mitigations
Debrief
Chapter 18: Covert Communication
Command and Control Communication
Controlling Coms
Recommended Security Controls and Mitigations
Debrief
Chapter 19: Call Signs
Operator Tradecraft
Detecting the Presence of Call Signs
Recommended Security Controls and Mitigations
Debrief
Chapter 20: Light, Noise, and Litter Discipline
Cyber Light, Noise, and Litter
Detection Discipline
Recommended Security Controls and Mitigations
Debrief
Chapter 21: Circumstances of Infiltration
Adversarial Opportunity
Adversarial Adversity
Recommended Security Controls and Mitigations
Debrief
Chapter 22: Zero-Days
Zero-Day
Zero-Day Defense
Recommended Security Controls and Mitigations
Debrief
Chapter 23: Hiring Shinobi
Cybersecurity Talent
Talent Management
Recommended Security Controls and Mitigations
Debrief
Chapter 24: Guardhouse Behavior
Security Operations Center Issues and Expectations
Influencing Behavior
Recommended Security Controls and Mitigations
Debrief
Chapter 25: Zero-Trust Threat Management
Threat Opportunity
Blocking the Suspicious
Recommended Security Controls and Mitigations
Debrief
Chapter 26: Shinobi Tradecraft
Techniques, Tactics, and Procedures
Pyramid of Pain
ATT&CK Framework
Threat Intelligence
Cyber Threat Intelligence
Recommended Security Controls and Mitigations
Debrief
Endnotes
Chapter 1, Mapping Networks
Chapter 2, Guarding with Special Care
Chapter 3, Xenophobic Security
Chapter 4, Identification Challenge
Chapter 5, Double-Sealed Password
Chapter 6, Hours of Infiltration
Chapter 7, Access to Time
Chapter 8, Tools
Chapter 9, Sensors
Chapter 10, Bridges and Ladders
Chapter 11, Locks
Chapter 12, Moon on the Water
Chapter 13, Worm Agent
Chapter 14, Ghost on the Moon
Chapter 15, The Art of the Fireflies
Chapter 16, Live Capture
Chapter 17, Fire Attack
Chapter 18, Covert Communication
Chapter 19, Call Signs
Chapter 20, Light, Noise, and Litter Discipline
Chapter 21, Circumstances of Infiltration
Chapter 22, Zero-Days
Chapter 23, Hiring Shinobi
Chapter 24, Guardhouse Behavior
Chapter 25, Zero-Trust Threat Management
Chapter 26, Shinobi Tradecraft
Index
← Prev
Back
Next →
← Prev
Back
Next →