Network Attacks and Exploitation : A Framework.
Material type:
- text
- computer
- online resource
- 9781118987230
- 005.8
- HD30.38 -- .M668 2015eb
Cover -- Title Page -- Copyright -- Contents -- Introduction -- Chapter 1 Computer Network Exploitation -- Operations -- Operational Objectives -- Strategic Collection -- Directed Collection -- Non-Kinetic Computer Network Attack (CNA) -- Strategic Access -- Positional Access -- CNE Revisited -- A Framework for Computer Network Exploitation -- First Principles -- Principles -- Themes -- Summary -- Chapter 2 The Attacker -- Principle of Humanity -- Life Cycle of an Operation -- Stage 1: Targeting -- Stage 2: Initial Access -- Stage 3: Persistence -- Stage 4: Expansion -- Stage 5: Exfiltration -- Stage 6: Detection -- Principle of Access -- Inbound Access -- Outbound Access -- Bidirectional Access -- No Outside Access -- Access Summary -- Principle of Economy -- Time -- Targeting Capabilities -- Exploitation Expertise -- Networking Expertise -- Software Development Expertise -- Operational Expertise -- Operational Analysis Expertise -- Technical Resources -- Economy Summary -- Attacker Structure -- Summary -- Chapter 3 The Defender -- Principle of Humanity -- Humanity and Network Layout -- Humanity and Security Policy -- Principle of Access -- The Defensive Life Cycle -- Principle of Economy -- The Helpful Defender -- Summary -- Chapter 4 Asymmetries -- False Asymmetries -- Advantage Attacker -- Motivation -- Initiative -- Focus -- Effect of Failure -- Knowledge of Technology -- Analysis of Opponent -- Tailored Software -- Rate of Change -- Advantage Defender -- Network Awareness -- Network Posture -- Advantage Indeterminate -- Time -- Efficiency -- Summary -- Chapter 5 Attacker Frictions -- Mistakes -- Complexity -- Flawed Attack Tools -- Upgrades and Updates -- Other Attackers -- The Security Community -- Bad Luck -- Summary -- Chapter 6 Defender Frictions -- Mistakes -- Flawed Software -- Inertia -- The Security Community -- Complexity -- Users.
Bad Luck -- Summary -- Chapter 7 Offensive Strategy -- Principle 1: Knowledge -- Measuring Knowledge -- Principle 2: Awareness -- Measuring Awareness -- Principle 3: Innovation -- Measuring Innovation -- Defensive Innovation -- Principle 4: Precaution -- Measuring Precaution -- Principle 5: Operational Security -- Minimizing Exposure -- Minimizing Recognition -- Controlling Reaction -- Measuring Operational Security -- Principle 6: Program Security -- Attacker Liabilities -- Program Security Costs -- Measuring Program Security -- Crafting an Offensive Strategy -- Modular Frameworks -- A Note on Tactical Decisions -- Summary -- Chapter 8 Defensive Strategy -- Failed Tactics -- Antivirus and Signature-Based Detection -- Password Policies -- User Training -- Crafting a Defensive Strategy -- Cloud-Based Security -- Summary -- Chapter 9 Offensive Case Studies -- Stuxnet -- Access -- Economy -- Humanity -- Knowledge -- Awareness -- Precaution -- Innovation -- Operational Security -- Program Security -- Stuxnet Summary -- Flame -- Gauss -- Dragonfly -- Red October -- APT1 -- Axiom -- Summary -- Epilogue -- Appendix Attack Tools -- Antivirus Defeats -- Audio/Webcam Recording -- Backdoor -- Bootkit -- Collection Tools -- Exploits -- Fuzzer -- Hardware-based Trojan -- Implant -- Keystroke Logger -- Network Capture -- Network Survey -- Network Tunnel -- Password Dumpers and Crackers -- Packer -- Persistence Mechanism -- Polymorphic Code Generator -- Rootkit -- Screen Scraper -- System Survey -- Vulnerability Scanner -- References -- Bibliography -- Index -- EULA.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.