![]() | This article has multiple issues. Please help
improve it or discuss these issues on the
talk page. (
Learn how and when to remove these template messages)
|
![]() | |
Author | Sean Bodmer Max Kilger Gregory Carpenter Jade Jones |
---|---|
Language | English |
Genre | Cyber Security, Deception, Counter Deception, Threat Intelligence |
Publisher | McGraw-Hill Publishers |
Publication date | 24 July 2012 [1] |
Publication place | United States |
Media type | Paperback [2] |
Pages | 464 pp [1] |
ISBN | 978-0071772495 |
Reverse Deception: Organized Cyber Threat Counter-Exploitation is a book by Sean Bodmer, Max Kilger, Gregory Carpenter, and Jade Jones. It investigates methods and criteria to address organizational responses to Advanced Persistent Threats [3] and cyber deception. [4] It details how to identify APTs and prioritize actions by applying skilled, field-tested private and government sector processes and methods, which often involve cyber deception. [3]
The book reviews the most historical and significant malware: Titan Rain, Moonlight Maze, Stakkato and Stuxnet are reviewed in light of APT criteria. The exploits of Stuxnet and these major cyber events are reviewed from an operational aspect. These exploits were complex and expensive because the development of APT is resource-intensive. It is most often believed to be sponsored by a government, in essence conducting an offensive action. In some countries, this can be a crime, while others consider it an aggressive defensive technique.
The work contains four stories regarding deception and counter deception. These are explained to be fictionalized works based on actual events that occurred somewhere in the law enforcement and intelligence worlds, but there is no way of vetting this, and it is not clear if these works are rooted in US domestic or international work. The cases are varied and considered compelling by [5] noted cybercritics and reviewers of this work.
The authors introduces the first theory for classifying a threat on the opportunistic-APT continuum as either persistent or non-persistent. The APT classifications and criteria are now widely used in the industry and are built off of an evaluation of the following criteria: [6] [4] [7]
![]() | This article has multiple issues. Please help
improve it or discuss these issues on the
talk page. (
Learn how and when to remove these template messages)
|
![]() | |
Author | Sean Bodmer Max Kilger Gregory Carpenter Jade Jones |
---|---|
Language | English |
Genre | Cyber Security, Deception, Counter Deception, Threat Intelligence |
Publisher | McGraw-Hill Publishers |
Publication date | 24 July 2012 [1] |
Publication place | United States |
Media type | Paperback [2] |
Pages | 464 pp [1] |
ISBN | 978-0071772495 |
Reverse Deception: Organized Cyber Threat Counter-Exploitation is a book by Sean Bodmer, Max Kilger, Gregory Carpenter, and Jade Jones. It investigates methods and criteria to address organizational responses to Advanced Persistent Threats [3] and cyber deception. [4] It details how to identify APTs and prioritize actions by applying skilled, field-tested private and government sector processes and methods, which often involve cyber deception. [3]
The book reviews the most historical and significant malware: Titan Rain, Moonlight Maze, Stakkato and Stuxnet are reviewed in light of APT criteria. The exploits of Stuxnet and these major cyber events are reviewed from an operational aspect. These exploits were complex and expensive because the development of APT is resource-intensive. It is most often believed to be sponsored by a government, in essence conducting an offensive action. In some countries, this can be a crime, while others consider it an aggressive defensive technique.
The work contains four stories regarding deception and counter deception. These are explained to be fictionalized works based on actual events that occurred somewhere in the law enforcement and intelligence worlds, but there is no way of vetting this, and it is not clear if these works are rooted in US domestic or international work. The cases are varied and considered compelling by [5] noted cybercritics and reviewers of this work.
The authors introduces the first theory for classifying a threat on the opportunistic-APT continuum as either persistent or non-persistent. The APT classifications and criteria are now widely used in the industry and are built off of an evaluation of the following criteria: [6] [4] [7]