Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

Reverse Deception: Organized Cyber Threat Counter-Exploitation (128 page)

AV logs
AV tools
AV Tracker

B

balance of power
Barboz, David
Basic Input/Output Systems (BIOS)
Behavioral Analysis Units
behavioral profiling
Bencivenga, Angelo
bias
bill number
bills
BIOS (Basic Input/Output Systems)
Bitcoin currency
blackhat community
Blackhole exploit kits
blacklists
blocking
bluffing
Bodmer, Sean
Bongardt, Steve
booting computer
botnet masters
botnet operators (goonies)
botnets
        Citadel
        Ice-X
        overview
        SpyEye
        Stormworm
        subleasing
        Zeus
BPH (bulletproof hosting)
Brenner, Joel (Dr.)
British law enforcement
Brussel, James
bulletproof hosting (BPH)
Byzantine Hades APT

C

Cain & Able tool
Canadian Dow Chemical
Candor APT
Canter, David
carding communities
career criminals
Carrier Service Provider (CSP) tools
cause, as motivation
CCI (cyber counterintelligence)
CCTV (closed circuit television)
CDs, automount
censorship
center of gravity (COG)
centralized planning/control
channel capacity
chapter
chaptered
characterization.
See
attack characterization
Chief Information Officer (CIO)
Chief Security Officer (CSO)
Chiesa, Raoul
China
Chinese counterintelligence
Chinese government
Chinese hacking groups
Chinese Information Warfare doctrine
Chinese state-sponsored hackers
Chinese-backed attacks
“Choice of Types” deception
CI (counterintelligence)
CIA (criminal investigative analysis).
See also
profiling
CIO (Chief Information Officer)
circle theory
circles of trust
Cisco Systems, Inc.
Citadel bot
citations
civilian cyber warrior
ClamAV tool
classification/dissemination rules
Clean MX data repository
client-side exploits
closed circuit television (CCTV)
clues
CnC (Command and Control)
CnC back-end server
COA (Course of Action)
codes.
See also
statutes
COG (center of gravity)
cognitive psychology
collected intelligence
collection planning
collection/analysis
Command and Control.
See
CnC
communication skills
communications, socially meaningful
commuters
computer crime.
See
cyber crimes
computer security.
See also
security
        boot issues
        importance of
        physical security
        vetting
computers
        automounting
        bootup of
        physical access to
Conficker virus
consistency
Contagio Malware Dump
context staging
copyrights
Core Impact tool
counterintelligence.
See also
cyber counterintelligence
        anonymity and
        applying to cyber realm
        asset validation
        Chinese
        classification/dissemination rules
        collection/analysis
        conclusion
        considerations
        countermeasures
        double agent operations
        fundamental competencies
        interviewing/debriefing techniques
        joint/interagency operations
        key points
        observables
        relationships
        reporting procedures/methods
        research/technology protection
        risk assessment
        Russian
        sizing up APTs
        survelliance/countersurveillance
        terminology
        United States
        “whack and tag a mole”
counterintelligence (CI)
countermeasures
countersurveillance
coup stick
Course of Action (COA)
cowpens
crimes.
See
cyber crimes
crimeware/analysis detection systems
criminal investigative analysis (CIA).
See also
profiling criminals
        career
        hacking into infrastructure
        profiling.
See
profiling
        Russian Business Network
        skill level
        teams of
        tools/techniques
        violent
CSO (Chief Security Officer)
CSP (Carrier Service Provider) tools
CTA (cyber threat acquisition)
Cyber Adversary Characterization
cyber counterintelligence (CCI).
See also
counterintelligence
cyber crimes
        four epochs in
        geographic details
        motivation for.
See
motivation
        reported
        skill level
        social networks.
See
social networks
        time of
cyber currency
cyber espionage
cyber profiling
cyber threat acquisition (CTA)
cyber warfare
cyber warrior
cyberspace
        considerations
        ethics in
        role of

D

Other books

Black Sheep by Na'ima B. Robert
Loving the Tigers by Tianna Xander
The Married Mistress by Kate Walker
You're Not You by Michelle Wildgen
Until by Timmothy B. Mccann
The Wandering Caravan by E. L. Todd
Nebulon Horror by Cave, Hugh
Hunted (Dark Protectors) by Zanetti, Rebecca