Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

by Aditya Sood, Richard Enbody

Paperback

$29.95
View All Available Formats & Editions
Use Standard Shipping. For guaranteed delivery by December 24, use Express or Expedited Shipping.

Product Details

ISBN-13: 9780128006047
Publisher: Elsevier Science
Publication date: 05/02/2014
Pages: 158
Sales rank: 1,071,451
Product dimensions: 5.80(w) x 8.80(h) x 0.50(d)

About the Author

Aditya K Sood (Ph.D) is a Lead Architect for Cloud Threat Labs at Elastica. Dr. Sood has research interests in malware automation and analysis, application security, secure software design and cybercrime. He has worked on a number of projects pertaining to penetration testing specializing in product/appliance security, networks, mobile and web applications while serving Fortune 500 clients for IOActive, KPMG and others. He has authored several papers for various magazines and journals including IEEE, Elsevier, CrossTalk, ISACA, Virus Bulletin, Usenix and others. His work has been featured in several media outlets including Associated Press, Fox News, The Register, Guardian, Business Insider, Kaspersky Threatpost, CBC and others. He has been an active speaker at industry conferences and presented at BlackHat, DEFCON, HackInTheBox, RSA, Virus Bulletin, OWASP and many others. Dr. Sood obtained his Phd from Michigan State University in Computer Sciences. Dr. Sood is also an author of "Targeted Cyber Attacks" book published by Syngress.

Company Website: http://www.elastica.net

Personal Website: http://adityaksood.secniche.org

Dr. Richard Enbody is an Associate Professor in the Department of Computer Science and Engineering. He joined the faculty in 1987 after earning his Ph.D. in Computer Science from the University of Minnesota. Richard received his B.A. in Mathematics from Carleton College in Northfield, Minnesota in 1976, and spent six years teaching high school mathematics in Vermont and New Hampshire. Richard has published research in a variety of areas, but mostly in computer security and computer architecture. He holds two nanotechnology patents from his collaboration with Physicists. Together with Bill Punch he published a textbook using Python in CS1: The Practice of Computing Using Python (Addison-Wesley, 2010), now in its second edition. When not teaching, Richard plays hockey, squash, canoes, as well as a host of family activities.

Table of Contents

Chapter 1: Introduction

Chapter 2: Intelligence Gathering

Chapter3: Infecting the Target

Chapter 4: System Exploitation

Chapter 5: Data Exfiltration Mechanisms

Chapter 6: Maintaining Control and Lateral Movement

Chapter 7: Why are Targeted Cyber Attacks Easy to Conduct?

Chapter 8: Challenges and Countermeasures

Chapter 9: Conclusion

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews