Skip to content
Paperback Cyber Adversary Characterization: Auditing the Hacker Mind Book

ISBN: 1931836116

ISBN13: 9781931836111

Cyber Adversary Characterization: Auditing the Hacker Mind

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has... This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Good

$6.69
Save $48.26!
List Price $54.95
Almost Gone, Only 2 Left!

Customer Reviews

4 ratings

Know thy self, know thy enemy

Know thy enemy. This is only part of a famous quote by Sun Tzu. It is often quoted and is quite appropriate when discussing Cyber Adversary Characterization: Auditing The Hacker Mind (Tom Parker, Eric Shaw, et al, Syngress Press, 2004, 356 Pages, ISBN 1931836116). But to truly appreciate this book, which includes an account of Kevin Mitnick's first hand description of one of his attacks, you need to think about the entire quote from The Art of War: "Know thy self, know thy enemy. A thousand battles, a thousand victories." The battle against hackers is not a single battle, but an on-going series of battles against an enemy that is often unseen and unknown. What the authors of this book attempt to do is offer a glimpse in the minds of hackers, what predisposes them to their behaviours, and an understanding of how this knowledge might be used to gain an advantage over this unseen enemy. To do so requires discussions of real events, psychology and modeling. As such, this book is not for everyone, especially those who want an easy read. Psychological modeling is a difficult task to not only do, but to understand. The authors do their best in making this as easy as possible to understand, but I know I still had to re-read some sections multiple times. If you read this book, you will not walk away citing parts verbatim, but you will have a good desk reference to use when needed. What is especially valuable in this book is the coverage of threats, both internal and external. The authors not only discuss this in terms and concepts, but offer methods to model and prioritize the threats. Have you ever thought about how myopic and narrow approaches can actually put you at greater risk? Who Should Read This Book? This is not a book for generalists. It really is for security specialists and students of security who want to get more than a superficial knowledge of the subject. Perhaps it might even be of interest to students of sociology and psychology. Tzu also said, "The opportunity to secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself." That is the reason this book is one for the library of .serious students of the topic. If you do not fit any of these categories, you might want to steer clear. If you don't, know what you are getting into. Scorecard Par on an Par 4

Insights into evaluating security risks

I'm not a statistician or a risk expert, so I mainly view this book in terms of illuminating possible areas of risk. It was interesting to see how a threat could be evaluated, but I spent most of my time reading the initial threats portion at the beginning of each chapter. These were interesting enough. The text is a little uneven, which is most likely from the multiple authors. The graphics are poor quality. And the organization could use some work. I would have liked to have been inspired to appreciate the characterization portions of the book, but I was not moved to do so.

Auditing The Hacker Mind

Cyber Adversary Characterization is a topic which many of the books authors have been studying for a number of years. You will notice that the backgrounds of the authors differ significantly, something which was entirely intentional. The authors of Auditing the Hacker Mind and the members of the working group to which all authors of the book belong bring a vast amount of knowledge relating to threat analysis and risk mitigation to the table. This has allowed us to examine the semantics of the cyber adversary from multiple points of view; allowing us to identify the multiple elements which really contribute to explaining what the modern cyber adversary 'looks like' and why. In addition to its more obvious audience of the information security community, Cyber Adversary Characterization: Auditing the Hacker Mind has been written for a wide audience - from Information Technology managers, to regular systems administrators. Perhaps you are responsible for budgeting for the security related outgoings of a department; can you honestly say that you are able to attribute every dollar to a real, characterized threat? Could you tell a senior manager where you think the threat might come from, the tools they might use and indeed, the precise assets that they might target? Our aim is to allow you to look at your technological assets from a new perspective - that being the perspective of the cyber adversary them self. As a result, we hope you will attain the capability to make informed decisions regarding the way in which you can better protect your systems and justify any changes you make. In addition to its use for the theoretical characterization of threats to key assets, we also believe that the theory we have developed proves to be of great use in the unfortunate cases where incidents have occurred. Through studying the way in which we have dissected the cyber adversary, we hope that you will be able to look at attack data in an objective manner, identifying such things as the skill level of the adversary involved, answering why the adversary initiated an attack against the target in the first place - and perhaps most importantly if the attack was a success, how to fend of the adversary if they return. We hope you find this publication of use. We believe that the information contained within it is of great value; and really can help in bettering the way in which people look at protecting their business critical computer networks, from the cyber adversary of today and tomorrow.

A methodical assessment of risk...

I finished reading Cyber Adversary Characterization - Auditing The Hacker Mind by Tom Parker, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. This is a very different book than anything I've seen, read, or reviewed... Chapter breakout: Introduction; Theoretical Characterization Metrics; Disclosure and the Cyber Food Chain; Rating the Attack: Post-Incident Characterization Metrics; Asset Threat Characterization; Bringing It All Together: Completing the Cyber Adversary Model; WarmTouch: Assessing the Insider Threat and Relationship Management; Managing the Insider Threat; The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures; Characterizing the Extremes - Terrorists and Nation States; Return on Investment; Final Words; Glossary; Index Most books that concern themselves with the "hacker mindset" do so with personality characterizations and attack methods. When you get done, you may understand how attacks occur, but you're no further along in doing a critical risk assessment of your particular environment. This book is the first I've seen that attempts to analyze the components mathematically in order to allow you to weight different scenarios against each other. The authors do a decent job in taking individual characteristics of the attacker, the environment, and the target, explaining how each component affects an attack scenario, and then giving a formula that can be used to assign a numeric value. While you may not agree with the interpretation, it's a rigorous approach to something that can be hard to quantify. I haven't decided whether I approve of the WarmTouch chapter. It's a software package developed by the authors that attempts to chart threat assessment from a person based on email wording, actions, and other observed behavior. The idea is interesting, but I normally have issues with a book like this being used to push an author's product. I'll just say buyer beware in this case... Bottom line... this would be a useful read for someone in security consulting and auditing, and would help an organization take a methodical view of their environment for risk assessment. There's not much on the book market like this volume.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured