Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Foreword
Preface
Acknowledgments
About the Authors
1. Cybercrime and Espionage and the New Security 101
Information in this chapter
Introduction
He Who Does Not Prevent a Crime When He Can, Encourages It
What’s Old Is New Again
A Changing World
Cybercriminal Statistics: U.S. and Abroad
The Statistics of Cybercrime
Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals
Trends in 2011
Myopic to the Catastrophic: Advanced Persistent Threats
Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and Espionage
Agendas in Next Generation Cybercriminal Activity
The Coming Decade
Summary
2. Evolution Revolution
Information in this chapter
Introduction
Communication
Criminal Activity
Summary
3. The Silent Killer: How Regulatory Compliance has Worsened the State of Information Security
Information in this chapter
Introduction
Regulatory Compliance Telemetry
Transborder Data Flow Restrictions
ISO Security Standards
Health Insurance Portability and Accountability Act (HIPAA)
Family Education Rights and Privacy Act (FERPA)
Payment Card Industry Data Security Standard (PCI DSS)
North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP)
Summary
References
4. Mediating the Great Divorce: The Convergence of Physical and Logical Security
Information in this chapter
Introduction
The CISSP Physical Security Domains
Environmental Security
The Silos of Security
Two-Factor Authentication
Converging the Great Physical Divide
Physical Device Security (Cryptography)
Proximity-Based Access Control
Summary
References
5. Nonstate Sponsored Attacks: Stealing Information is Our Business… and Business is Good
Information in this chapter
Introduction
Asymmetric Forms of Information Gathering
Blended Reconnaissance
Social Engineering and Social Networking
Point, Click, and Own
Summary
References
6. State-Sponsored Intelligence
Information in this chapter
Introduction
Espionage and Its Influence on Next-Generation Threats
Intelligence Types
Traditional Forms of Intelligence Gathering
Summary
7. Cyber X: Criminal Syndicates, Nation States, Subnational Entities, and Beyond
Information in this chapter
Introduction
Classifying the Cyber Actor
Attack Sophistication Model
Modus Operandi
The Importance of Attribution
Criminal and Organized Syndicates
Nation States
Subnational Entities
Summary
References
8. The Rise of the Subversive Multivector Threat
Information in this chapter
Introduction
Defining the Subversive Multivector Threat (SMT)
Summary
9. Seven Commonalities of Subversive Multivector Threats
Information in this chapter
Introduction
Seven Commonalities of Subversive Multivector Threats
Five Names in Threats You Should Know
Next-Generation Techniques and Tools for Avoidance and Obfuscation
Summary
References
10. Examples of Compromise and Presence of Subversive Multivector Threats
Information in this chapter
Introduction
Black, White, and Gray: Motives and Agendas of Cyber Actors with Respect to Cybercrime and Espionage
Onion Routed and Anonymous Networks
WikiLeaks
Project Aurora
Summary
11. Hiding in Plain Sight: Next-Generation Techniques and Tools for Avoidance and Obfuscation
Information in this chapter
Introduction
Malware Quality Assurance Testing
IP Attribution
IP Spoofing
Summary
References
12. Weapons of Our Warfare: Next-Generation Techniques and Tools for Detection, Identification, and Analysis
Information in this chapter
Introduction
Legacy Firewalls
Antivirus
Intrusion Detection Systems and Intrusion Prevention Systems
What Is in a Name?
MOSAIC
Advanced Meta-Network Security Analysis
Next Generation Security Framework
Summary
References
Index
← Prev
Back
Next →
← Prev
Back
Next →