Know Your Enemy: Learning about Security Threats / Edition 2

Know Your Enemy: Learning about Security Threats / Edition 2

by Honeynet Project, The
4.0 2
ISBN-10:
0321166469
ISBN-13:
9780321166463
Pub. Date:
05/31/2004
Publisher:
Addison-Wesley

Paperback

Select a Purchase Option (REV)
  • purchase options
    $41.51 $54.99 Save 25% Current price is $41.51, Original price is $54.99. You Save 25%.
  • purchase options

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Know Your Enemy: Learning About Security Threats 4 out of 5 based on 0 ratings. 2 reviews.
DavGMZ67 More than 1 year ago
Today we have broadened our horizons with this new technology called the internet. As with most new innovations the promise is to improve upon society. What this book points out is how the internet has proven to be a place where there is a growing fancy by governments, corporations, and everyday people to engage in practices of hacking, intrusion, repression, racism, far beyond the definitions of the past. The book points out how the motivating factors of greed, and control almost to a level of totalitarian extremes could in fact culminate the utter destruction of societies on a global scale, and could bring the utter annihilation of the planet. Quite possible the statement, "America will destroy itself from within", has changed to, "The world will destroy itself from within". This is whee critical thinking, and global response is necessary in order to come full circle and understand what we might be doing to one another if the course of this history is not changed. This is my scholarly, and stoic point of view.
Guest More than 1 year ago
The Honeynet Project grew out of an informal group of computer experts who decided to take an active role in tracking breakins to computers. Existing countermeasures, like firewalls and frequent patching of discovered bugs, were fundamentally defensive. And these did not actively try to understand the capabilities of the crackers/intruders/blackhats. This second edition describes what the authors call Gen 2 Honeynets. These are more sophisticated (than Gen 1) networks of honeypots, where a honeypot is a computer expressly deployed for blackhats to intrude upon. The book delves in some length on how to construct a honeypot and a honeynet. Various configurations are possible. A honeypot could mimic a Microsoft computer, or a Solaris or linux box. There is more emphasis on the actual machine being linux because of the open source nature, which has led to the development of tools like Snort, Ethereal and Sebek. Indeed, Snort-Inline and Sebek were developed by the Honeynet Project. The book talks about the crafty keyboard sniffing via Sebek, and the network sniffing using Ethereal. Plus, variant arrangements like having one computer pretend to be several honeypots are also discussed. Or, also, where a honeynet might be physically far from the production net (which is the actual computers for regular usage), but linked to it via a VPN. It turns out that in this case, if the honeynet is far enough away, if the blackhat does a ping and compares the times to those to the production net, she can quickly see a discrepancy. So she can suspect the presence of the honeynet. There appears to be more means to counteract this, as it is ultimately due to the speed of light constraint on signal speed. Overall, this book is scarcely the last word in fighting blackhats. The blackhats will certainly devour this book to concoct their next generation efforts. You can safely predict a third edition of this book.