Network Attacks and Exploitation A Framework 1st edition by Matthew Monte – Ebook PDF Instant Download/Delivery.9781118987087, 111898708X
Full download Network Attacks and Exploitation A Framework 1st edition after payment
Product details:
ISBN 10: 111898708X
ISBN 13: 9781118987087
Author: Matthew Monte
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage). Computer Network ExploitationStrategic Collection (leaked NSA programs)Directed Collection (China stealing Patriot Missile designs)Virtual Computer Network Attack (VCNA) (Russia vs. Estonia, Georgia)The AttackerHumanity Access Targeting CapabilitiesExploitation ExpertiseNetworking ExpertiseSoftware Development ExpertiseThe DefenderNetwork DesignSecurity PolicyDefensive Life Cycle The Helpful DefenderAttacker FrictionsFlawed Attack ToolsUpgrades and UpdatesDefender Frictions Flawed Software and UpdatesOffensive StrategyProgram SecurityAttacker LiabilitiesProgram Security CostsDefensive StrategyFailed TacticsApplication WhitelistingNetwork segmentation and segregationWeb domain whitelisting for all domainsCloud Based SecurityOffensive Case Studies Stuxnet, Target, ATM thieves, etc.Defensive strategies to prevent exploitation
Network Attacks and Exploitation A Framework 1st Table of contents:
Chapter 1: Computer Network Exploitation
- Operations
- Operational Objectives
- Strategic Collection
- Directed Collection
- Non-Kinetic Computer Network Attack (CNA)
- Strategic Access
- Positional Access
- CNE Revisited
- A Framework for Computer Network Exploitation
- First Principles
- Principles
- Themes
- Summary
Chapter 2: The Attacker
- Principle of Humanity
- Life Cycle of an Operation
- Stage 1: Targeting
- Stage 2: Initial Access
- Stage 3: Persistence
- Stage 4: Expansion
- Stage 5: Exfiltration
- Stage 6: Detection
- Principle of Access
- Inbound Access
- Outbound Access
- Bidirectional Access
- No Outside Access
- Access Summary
- Principle of Economy
- Time
- Targeting Capabilities
- Exploitation Expertise
- Networking Expertise
- Software Development Expertise
- Operational Expertise
- Operational Analysis Expertise
- Technical Resources
- Economy Summary
- Attacker Structure
- Summary
Chapter 3: The Defender
- Principle of Humanity
- Humanity and Network Layout
- Humanity and Security Policy
- Principle of Access
- The Defensive Life Cycle
- Principle of Economy
- The Helpful Defender
- Summary
Chapter 4: Asymmetries
- False Asymmetries
- Advantage Attacker
- Motivation
- Initiative
- Focus
- Effect of Failure
- Knowledge of Technology
- Analysis of Opponent
- Tailored Software
- Rate of Change
- Advantage Defender
- Network Awareness
- Network Posture
- Advantage Indeterminate
- Time
- Efficiency
- Summary
Chapter 5: Attacker Frictions
- Mistakes
- Complexity
- Flawed Attack Tools
- Upgrades and Updates
- Other Attackers
- The Security Community
- Bad Luck
- Summary
Chapter 6: Defender Frictions
- Mistakes
- Flawed Software
- Inertia
- The Security Community
- Complexity
- Users
- Bad Luck
- Summary
Chapter 7: Offensive Strategy
- Principle 1: Knowledge
- Measuring Knowledge
- Principle 2: Awareness
- Measuring Awareness
- Principle 3: Innovation
- Measuring Innovation
- Defensive Innovation
- Principle 4: Precaution
- Measuring Precaution
- Principle 5: Operational Security
- Minimizing Exposure
- Minimizing Recognition
- Controlling Reaction
- Measuring Operational Security
- Principle 6: Program Security
- Attacker Liabilities
- Program Security Costs
- Measuring Program Security
- Crafting an Offensive Strategy
- Modular Frameworks
- A Note on Tactical Decisions
- Summary
Chapter 8: Defensive Strategy
- Failed Tactics
- Antivirus and Signature-Based Detection
- Password Policies
- User Training
- Crafting a Defensive Strategy
- Cloud-Based Security
- Summary
Chapter 9: Offensive Case Studies
- Stuxnet
- Access
- Economy
- Humanity
- Knowledge
- Awareness
- Precaution
- Innovation
- Operational Security
- Program Security
- Stuxnet Summary
- Flame
- Gauss
- Dragonfly
- Red October
- APT1
- Axiom
- Summary
Epilogue
Appendix: Attack Tools
- Antivirus Defeats
- Audio/Webcam Recording
- Backdoor
- Bootkit
- Collection Tools
- Exploits
- Fuzzer
- Hardware-based Trojan
- Implant
- Keystroke Logger
- Network Capture
- Network Survey
- Network Tunnel
- Password Dumpers and Crackers
- Packer
- Persistence Mechanism
- Polymorphic Code Generator
- Rootkit
- Screen Scraper
- System Survey
- Vulnerability Scanner
References
People also search for Network Attacks and Exploitation A Framework 1st :
matthew monte network attacks and exploitation
network attacks and exploitation a framework pdf
network attacks examples
most common network attacks