Network Attacks and Exploitation: A Framework
| By: | Matthew Monte |
| Publisher: | Wiley Professional Development (P&T) |
| Print ISBN: | 9781118987124 |
| eText ISBN: | 9781118987087 |
| Edition: | 1 |
| Copyright: | 2015 |
| Format: | Page Fidelity |
eBook Features
Instant Access
Purchase and read your book immediately
Read Offline
Access your eTextbook anytime and anywhere
Study Tools
Built-in study tools like highlights and more
Read Aloud
Listen and follow along as Bookshelf reads to you
The book provides a clear and comprehensive roadmap for developing a complete offensive and defensive strategy to thwart both network attacks (hacking) and network exploitation (espionage). Computer Network ExploitationStrategic Collection (leaked NSA programs)Directed Collection (China stealing Patriot Missile designs)Virtual Computer Network Attack (VCNA) (Russia vs. Estonia, Georgia)The AttackerHumanity Access Targeting CapabilitiesExploitation ExpertiseNetworking ExpertiseSoftware Development ExpertiseThe DefenderNetwork DesignSecurity PolicyDefensive Life Cycle The Helpful DefenderAttacker FrictionsFlawed Attack ToolsUpgrades and UpdatesDefender Frictions Flawed Software and UpdatesOffensive StrategyProgram SecurityAttacker LiabilitiesProgram Security CostsDefensive StrategyFailed TacticsApplication WhitelistingNetwork segmentation and segregationWeb domain whitelisting for all domainsCloud Based SecurityOffensive Case Studies Stuxnet, Target, ATM thieves, etc.Defensive strategies to prevent exploitation