Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online

Authors: Sean Bodmer

Tags: #General, #security, #Computers

Reverse Deception: Organized Cyber Threat Counter-Exploitation (130 page)

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
7.33Mb size Format: txt, pdf, ePub
ads
Gangsta Bucks group
Gates, Bill
GEN (generation)
generation (GEN)
geolocation vector
GFI EndPointSecurity tool
Ghost Busters
GhostNet APT
glossary
Google incidents
        Chinese hackers
        Gmail exploit
Google Scholar
goonies
Gribodemon

H

Hack Forums
hacked websites
hackers.
See also
attackers
        antisocial behavior
        carding communities
        changing social structure of
        Chinese hacking groups
        demonization of
        derogatory dimension
        hacking for money
        Hacktivist groups
        magic/religion dimension
        as meritocracy
        motivation.
See
motivation
        “patriotic hackers”
        Russian hacking gangs
        social networks.
See
social networks
        social psychology
        state-sponsored hackers
        status position
        taxonomies
        technology dimension
hacking back
Hacktivist groups
Hanssen, Robert
Harper, Allen
Hazelwood, Roy
HBGary
Helms, Richard
HIDS (Host Intrusion Detection System)
High Orbit Ion Cannon (HOIC)
high-volume websites
HIPS (Host Intrusion Prevention System)
Hitler, Adolf
HMIs (human machine interfaces)
HOIC (High Orbit Ion Cannon)
Hollinger, Richard
Holt, Tom
homicides.
See also
murderers
honesty
honeyclients
honeygrids
Honeynet Project
honeynets
        architecture
        content filling
        “defense-in-depth”
        described
        detection of
        disabling of
        Gen III
        layers
        legal issues
        logs
        objectives
        production-based
        purpose of
        research-based
        risks/issues
        training for
        violations
honeypots
        considerations
        content staging
        described
        evidence obtained via
        example scenarios
        layers
        patch levels
        tuned
honeywalls
        accreditation
        data analysis
        data capture
        data collection
        data control
        overview
horizontal phishing
host configuration
host content
Host Intrusion Detection System (HIDS)
Host Intrusion Prevention System (HIPS)
host profiles
host-based detection tools
host/server vulnerability tools
HTTP (Hypertext Transfer Protocol)
human information processing limits
Human Intelligence (HUMINT)
human machine interfaces (HMIs)
HUMINT (Human Intelligence)
humor
“Husbanding of Deception Assets”
Hussein, Sadam
Hüssy, Roman
Hypertext Transfer Protocol (HTTP)

I

IAD (Information Assurance Directorate)
IC3 (Internet Crime Complaint Center)
Ice-X bots
ID (identification)
IDA Pro tool
identification (ID)
IDSs (intrusion detection systems)
Immunet Pro tool
indications
inductive profiling
industrial espionage.
See
espionage
infection vectors
infector
Information Assurance Directorate (IAD)
Information Operations
information security, vetting
Information Technology (IT)
information vectors
Information Warfare
Information Warfare Manual (IWM)
Information Warfare Monitor (IWM)
infrastructure costs
“in-game currency”
injection vectors
integration
intellectual property
Internet Crime Complaint Center (IC3)
Internet Protocol (IP)
Internet Relay Chat (IRC)
Internet Service Providers (ISPs)
Internet value chain
Internet Worm
Internetworking Operating System (IOS)
interviewing techniques
intrusion detection systems (IDSs)
intrusion prevention systems (IPSs)
intrusions.
See also
attacks
        postmortems
        risk tolerance
        timeliness aspect of
investigations
investigative techniques/tools
IOS (Internetworking Operating System)
IP (Internet Protocol)
IP addresses
IPSs (intrusion prevention systems)
Iraq invasion
IRC (Internet Relay Chat)
IRC chat logs
ISPs (Internet Service Providers)
IT (Information Technology)
IWM (Information Warfare Manual)
IWM (Information Warfare Monitor)

J

James, Lance
Jargon File
John the Ripper tool
Johnson, Samuel
joint/interagency operations
“Jones Dilemma”
jsunpack.jeek.org
Juniper Networks
Justia.com

K

BOOK: Reverse Deception: Organized Cyber Threat Counter-Exploitation
7.33Mb size Format: txt, pdf, ePub
ads

Other books

Kaleidoscope by Gail Bowen
A Younger Man by Cameron Dane
A Reason to Love by Alexis Morgan
2SpiceRack_bundle by Karen Stivali and Karen Booth and Lily Harlem
Child of My Heart by Alice McDermott
Baehrly Alive by Elizabeth A. Reeves
Sammy's Christmas List by Lillianna Blake