×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
     

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

by Will Gragido, John Pirc
 

See All Formats & Editions

ISBN-10: 1597496138

ISBN-13: 9781597496131

Pub. Date: 02/04/2011

Publisher: Elsevier Science

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black

Overview

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways.

This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis.

This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

    • Includes detailed analysis and examples of the threats in addition to related anecdotal information
    • Authors’ combined backgrounds of security, military, and intelligence, give you distinct and timely insights
    • Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them

    Product Details

    ISBN-13:
    9781597496131
    Publisher:
    Elsevier Science
    Publication date:
    02/04/2011
    Pages:
    272
    Product dimensions:
    7.40(w) x 9.20(h) x 0.80(d)

    Table of Contents

    Chapter 1. Introduction: Cybercrime and Espionage and the New Security 101 Chapter 2. Evolution Revolution: Maturity of Communications Systems and the Emergence of Advanced Web Technology Chapter 3. The Silent Killer: How Regulatory Compliance Has Worsened The State of Information Security Chapter 4. Mediating the Great Divorce: The Convergence of Physical and Logical SecurityNon-State Sponsored: Stealing Chapter 5: Information Is Our Business….and Business Is Good: Asymmetric Forms of Gathering Information Chapter 6: State Sponsored Intelligence Types Chapter 7: Cyber X: Criminal Syndicates, Nation states, Sub-National Entities and Beyond Chapter 8: Rise of the Subversive Multi-Vector Threat Chapter 9: Seven Commonalities of Subversive Multi-Vector Threats Chapter 10: Examples of Compromise and Presence of Subversive Multi-Vector Threats Chapter 11: Hiding in Plain Sight: Next Generation Techniques and Tools for Avoidance and Obfuscation Chapter 12: Weapons of Our Warfare: Next Generation Techniques and Tools for Detection, Identification and Analysis

    Customer Reviews

    Average Review:

    Post to your social network

         

    Most Helpful Customer Reviews

    See all customer reviews