Targeted Cyber Attacks Multi-staged Attacks Driven by Exploits and Malware
Auteurs : Sood Aditya, Enbody Richard
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
1. Introduction 2. Intelligence Gathering 3. Infecting the Target 4. System Exploitation 5. Data Exfiltration Mechanisms 6. Maintaining Control and Lateral Movement 7. Why are Targeted Cyber Attacks Easy to Conduct? 8. Challenges and Countermeasures 9. Conclusion
Company Website: http://www.elastica.net
Personal Website: http://adityaksood.secniche.org
Dr. Richard Enbody is an Associate Professor in the Department of Computer Science and Engineering. He joined the faculty in 1987 after earning his Ph.D. in Computer Science from the University of Minnesota. Richard received his B.A. in Mathematics from Carleton College in Northfield, Minnesota in 1976, and spent six years teaching high school mathematics in Vermont and New Hampshire. Richard has published research in a variety of areas, but mostly in computer security and computer architecture. He holds two nanotechnology patents from his collaboration with Physicists. Together with Bill Punch he published a textbook using Python in CS1: The Practice of Computing Using Python (Addison-Wesley, 2010), now in its second edition. When not teaching, Richard plays hockey, squash, canoes, as well as a host of family activities.
- A well-structured introduction into the world of targeted cyber-attacks
- Includes analysis of real-world attacks
- Written by cyber-security researchers and experts
Date de parution : 04-2014
Ouvrage de 158 p.
15.2x22.8 cm
Thème de Targeted Cyber Attacks :
Mots-clés :
cyber attacks; cyber security; targeted attacks; hacking; security; privacy; cyber crime