Cyber adversary characterization : auditing the hacker mind / Tom Parker ... [and others ; foreword by Jeff Moss]

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via EBSCO)
Other Authors: Parker, Tom
Format: eBook
Language:English
Published: Rockland, MA : Syngress, ©2004.
Subjects:
Table of Contents:
  • Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.