Book description
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
- A well-structured introduction into the world of targeted cyber-attacks
- Includes analysis of real-world attacks
- Written by cyber-security researchers and experts
Table of contents
- Cover image
- Title page
- Copyright
- A Few Words About Targeted Cyber Attacks
- Acknowledgments
- About the Authors
- Overview
- Chapter 1. Introduction
- Chapter 2. Intelligence Gathering
- Chapter 3. Infecting the Target
- Chapter 4. System Exploitation
- Chapter 5. Data Exfiltration Mechanisms
- Chapter 6. Maintaining Control and Lateral Movement
- Chapter 7. Why Targeted Cyber Attacks Are Easy to Conduct?
- Chapter 8. Challenges and Countermeasures
- Chapter 9. Conclusion
- Abbreviations
Product information
- Title: Targeted Cyber Attacks
- Author(s):
- Release date: April 2014
- Publisher(s): Syngress
- ISBN: 9780128006191
You might also like
book
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk …
book
Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s …
book
Cyber Warfare, 2nd Edition
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. …
book
Cybersecurity - Attack and Defense Strategies
Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior …