- Shopping Bag ( 0 items )
* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.
* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.
* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (moreimportantly) don't know about the types of adversaries they stand to face
Foreword by Jeff Moss
Chapter 1: Introduction
Chapter 2: Theoretical Characterization Metrics
Chapter 3: Disclosure and the Cyber Food Chain
Chapter 4: Rating the Attack: Post-Incident Characterization Metrics
Chapter 5: Asset Threat Characterization
Chapter 6: Bringing It All Together: Completing the Cyber Adversary Model
Chapter 7: WarmTouch: Assessing the Insider Threat and Relationship Management
Chapter 8: Managing the Insider Threat
Chapter 9: The Cyber Adversary in Groups: Targeting Nations’ Critical Infrastructures
Chapter 10: Characterizing the Extremes-Terrorists and Nation States
Chapter 11: Conclusions
Chapter 12: Return on Investment
Posted August 27, 2004
An uneven book. The preface and last chapter are by far the best parts. Noted technology commentator Richard Thieme ('Islands in the Clickstream') gives the preface. A mere 4 pages. But very eloquent and lucid. A joy to read. The last chapter is a semi-ficticious narrative of how a hacker breaks into various computers. Unix and network experts will like the depth and ingenuity described. It can be very educational, even for experienced sysadmins. But other chapters are poorly done. For example, Chapter 2 is on Theoretical Characterisation Metrics. It repeatedly uses various conditional probabilities, but with a wrong notation. For a probability of B given A, it uses p(B)/A. The standard notation is P(B|A). Used for decades in statistics course. First year undergraduate level. Other chapters, presumably written by different people, do use the correct notation. But Chapter 3, on the Cyber Food Chain, has an even more disturbing flaw. It has tables of what it calls mean inhibitor values. Derived from sets of values with only 1 significant figure. But the means are given to 4 significant figures! At best, the means only have 2. What this author is doing is imputing a false accuracy of 2 extra significant figures, or 100 times greater than actuality. More strictly, it is probably close to 1000 times greater, because the mean is really no better than one significant figure. So what? Well, given that the authors goof on such elementary steps, it should give you serious reservations about their more 'sophisticated' operations, where they discuss various metrics. Another thing. One chapter's title is mis-spelled on the top of every page in the chapter. Irritating. Makes one wonder about the proof reading.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.