Cyber adversary characterization : auditing the hacker mind / Tom Parker ... [and others ; foreword by Jeff Moss]
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...
Saved in:
Online Access: |
Full Text (via EBSCO) |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Rockland, MA :
Syngress,
©2004.
|
Subjects: |
Table of Contents:
- Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.