Reverse Deception: Organized Cyber Threat Counter-Exploitation

Reverse Deception: Organized Cyber Threat Counter-Exploitation

Sean Bodmer, Gregory Carpenter


In-depth counterintelligence strategies to struggle cyber-espionage

"A accomplished and exceptional evaluate of the subject by way of specialists within the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of complicated continual threats (APTs) utilizing the proven safeguard ideas and real-world case reports featured during this extraordinary consultant. Reverse Deception: geared up Cyber probability Counter-Exploitation exhibits the right way to determine your network’s vulnerabilities, 0 in on ambitions, and successfully block intruders. become aware of how you can organize electronic traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and determine malicious software program teams. The professional authors supply complete insurance of criminal and moral concerns, operational vetting, and defense crew administration.

  • Establish the pursuits and scope of your opposite deception crusade
  • Identify, research, and block APTs
  • Engage and seize nefarious participants and their agencies
  • Assemble cyber-profiles, incident analyses, and intelligence reviews
  • Uncover, do away with, and post-mortem crimeware, trojans, and botnets
  • Work with intrusion detection, anti-virus, and electronic forensics instruments
  • Employ stealth honeynet, honeypot, and sandbox applied sciences
  • Communicate and collaborate with criminal groups and legislations enforcement

Show sample text content

Download sample