Trisha Shetty (Editor)

Reverse Deception

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
6.6
/
10
1
Votes
Alchetron
6.6
1 Ratings
100
90
80
70
61
50
40
30
20
10
Rate This

Rate This

Country
  
United States

Series
  
Jack Reacher

Media type
  
Paperback

Originally published
  
24 July 2012

Publisher
  
S&P Global

3.3/5
Goodreads

Language
  
English

Publication date
  
24 July 2012

Pages
  
464 pp

Genre
  
Computer security

Reverse Deception t0gstaticcomimagesqtbnANd9GcTuk32QORElwGQyx6

Authors
  
Sean Bodmer, Dr. Max Kilger

Similar
  
Sean Bodmer books, Network security books

Reverse Deception: Organized Cyber Threat Counter-Exploitation is a textbook by Sean Bodmer, CISSP, CEH, Dr. Max Kilger, PhD, DrPH(c) Gregory Carpenter, CISM, and Jade Jones, ESQ about providing methods to rectify Advanced Persistent Threats. It details how to identity APTs and prioritize actions through applying skilled field-tested private- and government-sector methods. It also trains one to expose, pursue, and charge the creators of Advanced Persistent Threats. Additionally, the authors explain and demonstrate how to assess your network’s vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The authors provide full coverage of legal and ethical issues; specifically, how an IT professional can approach a corporate lawyer and explain what they would like to do with implementing deceptive network options in a language the legal council will understand. Computer adversary profiling and counterintelligence techniques assist professionals and the book adds another dimension by rounding out with operational vetting, and security team management.

Contents

The book also covers a "theoretical" hack of the virtual currency, Bitcoin. The following year, Bitcoin was attacked and millions were stolen.

Features inside book

Some of the features of the book are.

  • Figuring out the types of enemies threats derive from.
  • Analysis of cyber espionage tactics seen in the United States and globally, with comparisons of type of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa.
  • Uncover, eliminate, and autopsy crimeware, trojans, and botnets
  • Cat-and-mouse approaches which explain how to use duplicity and disinformation techniques against incoming threats.
  • Case studies and real stories from the authors’ FBI, DOD, NSA, and private sector work.
  • How to distinguish the appearance of malicious code
  • Identify, analyze, and block APTs
  • Value Chain Management
  • Counter espionage and espionage
  • Legal interpretations of capacities, limitations, and stipulations for assisting law enforcement investigations.
  • Authors

  • Sean M. Bodmer, CISSP, CEH, is Chief Researcher of Counter-Exploitation Intelligence at CounterTack, Inc.
  • Dr Max Kilger, Ph.D., is specialist in profiling and behavioral analysis of the black hat community and hackers. He is a founding member of the Honeynet Project, is currently on their board of directors, and serves as their chief membership officer and chief profiler.
  • DrPH (c) Gregory Carpenter, CISM, is an Adjunct Professor at Northern Virginia CC, on the International Board of Advisors at the MacKenzie Institute & on the Board of Directors of ATNA Systems.
  • Jade Jones, Juris Doctor with experience including Information Operations and Space Law. He is a civilian with the Department of Defense and a Navy JAG Commander in the Reserves.
  • References

    Reverse Deception Wikipedia