Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization [NOOK Book]

Overview

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent ...

See more details below
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$49.95
BN.com price

Overview

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.



Advanced Persistent Threat covers what you need to know including:

• How and why organizations are being attacked

• How to develop a "Risk based Approach to Security"

• Tools for protecting data and preventing attacks

• Critical information on how to respond and recover from an intrusion

• The emerging threat to Cloud based networks

Read More Show Less

Editorial Reviews

From the Publisher

"Cole explains why advanced persistence threats are able to bypass security measures on many large computer systems and recommends how to protect an organization's data from these well-organized attackers."--Reference and Research Book News, August 2013 "This book should come in handy to anyone who's tasked with protecting an organization's networks… definitely worth it, as it is clear, concise, and thought provoking."--HelpNetSecurity.com, February 21, 2013

Read More Show Less

Product Details

  • ISBN-13: 9781597499552
  • Publisher: Elsevier Science
  • Publication date: 12/31/2012
  • Sold by: Barnes & Noble
  • Format: eBook
  • Pages: 320
  • File size: 3 MB

Meet the Author

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.
Read More Show Less

Read an Excerpt

Advanced Persistent Threat

Understanding the Danger and How to Protect Your Organization


By Eric Cole

Elsevier Science

Copyright © 2013 Elsevier, Inc.
All rights reserved.
ISBN: 978-1-59749-955-2


Excerpt

CHAPTER 1

The Changing Threat


INTRODUCTION

Organizations continue to spend significant amount of money on security but today an interesting trend is happening. In the past spending money on security led to less compromises and increased protection. Today, organizations are increasing their security budgets but still getting compromised. What is being done today no longer seems to work.

The problem is that the threat has changed but organization's approach to security has not changed. While traditional threats are still a concern and cannot be ignored, organizations now have a new challenge dealing with the Advanced Persistent Threat known as the APT. The APT is well funded, organized groups that are systematically compromising government and commercial entities. The term originally was developed as a code name for Chinese-related intrusions against US military organizations. The term has evolved to refer to advanced adversaries that are focused on critical data with the goal of exploiting information in a covert manner. APTs are highly sophisticated and bypass virtually all "best practice" cyber security programs to try and establish a long-term network presence. The APT is attacks that are stealthy, targeted, and data focused which is quite different than traditional worms or viruses. The APT are very well-organized entities (typically foreign adversaries) that are targeting an organization to gather a specific piece of information today and ultimately maintain long-term access so information can be extracted at will in the future. APT breaks all of the rules of attackers by typically adapting their techniques on the file, targeting users as the entry point, and hiding their tracks very carefully; therefore many traditional security measures are not effective at dealing with this threat.

Today, the term APT has evolved and different people refer to it as different things. Some people only refer to attacks from China, while others include all attacks as being part of the APT. The goal of this book is not to debate a definition but to provide a guide of how to implement effective security that actually works against the advanced threats that are bypassing and rendering traditional security measures to be less effectively than they previously were against traditional viruses and worms. While the focus of this book is on APT, the real focus is implemented effective security that secures an organization from all threats up to and including the APT. The ultimate goal is raising awareness so organizations can have effective security against the APTv2 and the next generation of threats. A mistake that we have seen organizations make is they focus all their effort on the APT, forgetting about traditional threats and still get compromised.


THE CURRENT LANDSCAPE

Today, one cannot open up a newspaper, read a magazine, or turn on the news without hearing about another organization being compromised. It seems that organizations of all shapes and sizes have been compromised and there is no end in sight. Government, commercial, non-profit, universities, national, and international organizations have all had data breaches that have caused significant impact to the organization.

Hacker groups threatening to target an organization, causes fear and panic because history has shown us that they possess the will and ability to continuously attack an organization until they are successful. One of the goals today is to minimize the chance of being targeted. While an organization cannot live in fear, they should also be careful. It is never the victim's fault but if someone is walking in the bad part of town holding a large sum of money in their hand, the likelihood of being mugged is higher than if one keeps their money concealed and stays in the safer part of town. Many organizations, without even realizing it, are drawing unnecessary attention to themselves either by what employees say or what organization posts on their websites. Think of the impact and exposure social networking sites could cause to an organization. The good news is once an organization understands the threat and the capability of the adversaries, they can better protect themselves. It is important to note that with the APT an organization will always be targeted, but there are steps that can be taken to minimize the impact.

Since many organizations focus solely on fixing random vulnerabilities, for example patching, as their approach to security, they are not protecting against the threats that have the highest likelihood of compromise. This starts to explain why companies that spend millions of dollars each year on security still get compromised. For example, if you are the defensive coordinator for a football team, the team can be number one in the league at defending against the running game. The focus of all practices is fixing and removing the vulnerability of an opposing team running the football against the defense. While this is a noble cause and would take considerable effort, how effective would this team be against a team that primarily passes the football. The answer is not very effective. Many organizations are focusing all of their energy against a perceived threat, but if it turns out to be the wrong threat, they will still be compromised.

It is sometimes hard for people to accept this fact but in this day and age, an organization needs to recognize that they are going to be attacked with a high chance of compromise. While this might seem frustrating it is better to accept reality than live in denial. If someone claimed that they are never going to get sick for the rest of their life, you would probably shake your head and say that is a nice claim but it is not realistic. Saying that your organization will never get compromised is as naïve as saying you will never get sick. Continuing with our analogy, the goal when someone gets sick is to minimize the impact and ultimately not die. While we can eat healthy and take vitamins to reduce the number of times we get sick, when we do get sick the goal is to go to the doctor quickly and deal with the illness when it is still small. The general philosophy that we follow is prevention is ideal but detection is a must. An organization can do many things to minimize the chance of a compromise but it needs to make sure that appropriate measures are in place to detect and deal with an attack in a timely manner.

Briefly looking at APT, the advanced nature of the adversary means that they will usually find a way into an organization. What makes security so exciting is that we have a much harder job than the attacker. For the attacker to compromise an organization, they need to find one vulnerability. For the defense to stop an attack, we have to find every vulnerability. Unfortunately many companies do not understand all of their points of exposure and if the offense knows more than the defense we are going to lose. In addition, the attacker is very persistent. They will keep trying until they are successful.

The main reason the APT is successful is that it is a new threat that many organizations are not prepared to handle. The old threat was visible, went after long hanging fruit and if it failed would move on to its next target. Most of the security we have in place is prepared to handle this level of threat not the APT. While some of the APT attacks are automated, we are dealing with a sophisticated attacker who performs some of the attack with manual intervention. Since a human is involved with planning and potentially executing the attack, the adversary can adapt and utilize human intelligence to extract information from a target.


ORGANIZATIONS VIEW ON SECURITY

Over the years, the evolving and emerging threat has also changed how an organization and its executives view and assess their security posture. Over ten years ago there was a real threat but many executives were not afraid. By the mid-2000s they were afraid but did not know why. Today based on all of the breach data, they know why they are afraid but they do not know what to do about it. Many organizations are also not fully aware of the impact.

It is also common for organizations to not recognize that APT is the silent killer. It could be happening right now to an organization, but since there is nothing visible, they think everything is fine. Executives all of the time state that security has been telling us for the last three years how bad everything is and that we will be compromised, but nothing has happened which leads executives to think that cyber security is overhyped. In essence, executives say that security keeps saying the sky is falling and accuses the security group of being Chicken Little. The problem is that the sky has fallen, but organizations are not receiving the right information to realize that it is occurring. The simple question is: if there was a system on an organization's network that was compromised and slowly extracted information out of the organization, how would you know about it? If a user received an email that looked legitimate but contained embedded malware and clicked on it, how would an organization detect it?

Organizations have heard of the phrase APT and know that it can get around most security measures; they just do not have the proper information to recognize that the problem might be occurring right now. Instead of thinking of APT as a problem that could occur in the future, we have to recognize that it is a current problem that is occurring right now. A key motto of security is to assume the worst and hope for the best. Isn't it better to act as if you are compromised and be prepared, than be ignorant and be compromised? If you assume you are compromised and you are not, you have just gained a better understanding of your organization and improved your security. If you assume you are not compromised and you are, you could go out of business.

While some organizations are recognizing the devastating impact the APT can have, some are still living in denial. What many people think is that bad things happen to other organizations not ours. The number one motivator for someone purchasing an alarm system is they or someone they know very well is robbed. Unfortunately the current motivator for organizations implementing effective security is to take action after a breach occurs. Many organizations do not think bad things can happen to them until it does. In this day and age there is enough data and confirmed attacks that organizations have to recognize it is not a matter of if an attack is going to occur but when.


YOU WILL BE COMPROMISED

We have come to a point in security where organizations have to recognize the fact that they are going to be compromised. It is also safe to conclude that any critical systems that are connected to a network and ultimately connected to the Internet have already been compromised. As a society we must make the paradigm shift that the threat has advanced to the point where no system is safe. One of the key themes that will be echoed throughout this book is Prevention is Ideal but Detection is a Must. While an organization should hope and pray that they do not get compromised, they need to recognize that it is going to happen and put measures in place to detect it in a timely manner. Having a compromise is OK if it is caught quickly and appropriate remediation is taken to prevent reinfection. Having a compromise for 6months is not acceptable.

The ultimate goal is to make sure our organization does not go out of business. Ideally we need to detect any compromise early, react quickly, and minimize the overall damage. Looking at the amount of records compromised in recent breaches shows us that organizations are not doing an effective job at detection. If we were doing proper detection organizations would have 200 records stolen and be compromised for one week. Today it is not uncommon to see millions of records stolen over a several month period.

Saying that an organization will be compromised and most likely has been compromised is hard for some people to accept. However, it is merely the inverse of one of the fundamental truths of security—as soon as a system has any functionality or value to an organization, it is no longer 100% secure. A system that is 100% secure has 0% functionality. To put it another way a system that is 100% secure has minimal value to an organization because there is no functionality. As soon as you take a computer, plug it in to electricity, connect it to a network, and let humans touch the keyboard, the security has dropped below 100%. If the security is below 100%, then compromise could occur, it is just a matter of time.
(Continues...)


Excerpted from Advanced Persistent Threat by Eric Cole. Copyright © 2013 by Elsevier, Inc.. Excerpted by permission of Elsevier Science.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Section I: Understanding the Problem

Chapter 1: The Changing Threat

Chapter 2: Why Are Organizations Being Compromised

Chapter 3: How Are Organizations Being Compromised

Chapter 4: Risk Based Approach to Security

Section II: Emerging Trends –

Chapter 5: Protecting Your Data –

Chapter 6: Prevention is Ideal but Detection is a Must

Chapter 7: Respond and Recover

Chapter 8: Technologies for Success

Section III: The Future and How to Win

Chapter 9: The Changing Landscape: Cloud and Mobilization

Chapter 10 : Proactive Security and Reputational Ranking

Chapter 11: Focusing in on the Right Security

Chapter 12: Implementing Adaptive Security

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)