Chapter 7

Adversary Infrastructure

Abstract

Malignant threats are the most devastating, but you cannot ignore malicious threats. To understand how to mitigate malicious actors, you need to understand the resources and infrastructure that they have to compromise you.

Advanced persistent threats (APTs) have extensive planning, organization, and resources to target an organization. However, even amateurs can find extensive guidance, support, and technical resources readily available on the dark and deep web. By understanding the resources available to your adversary, you can better determine the resources you need to defend your organization.

Keywords

APT; Bitcoin; Botnets; Collection management; Dark web; Deep web; Encryption; Security researchers; Ransomware ...

Get Advanced Persistent Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.