Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Targeted cyber attacks : multi-staged attacks driven by exploits and malware
Bookmark Share

Text

Targeted cyber attacks : multi-staged attacks driven by exploits and malware

Sood, Aditya K - Personal Name; Enbody, Richard J - Personal Name;

Table of Contents

A Few Words About Targeted Cyber Attacks
Acknowledgments
About the Authors
Overview
Chapter 1. Introduction
References
Chapter 2. Intelligence Gathering
2.1 Intelligence Gathering Process
2.2 OSINT, CYBINT, and HUMINT
2.3 OSNs: A Case Study
References
Chapter 3. Infecting the Target
3.1 Elements Used in Incursion
3.2 Model A: Spear Phishing Attack: Malicious Attachments
3.3 Model B: Spear Phishing Attack: Embedded Malicious Links
3.4 Model C: Waterholing Attack
3.5 Model D: BYOD as Infection Carriers: USB
3.6 Model E: Direct Incursion: Network Exploitation
References
Chapter 4. System Exploitation
4.1 Modeling Exploits in Targeted Attacks
4.2 Elements Supporting System Exploitation
4.3 Defense Mechanisms and Existing Mitigations
4.4 Anatomy of Exploitation Techniques
4.5 Browser Exploitation Paradigm
4.6 Drive-By Download Attack Model
4.7 Stealth Malware Design and Tactics
References
Chapter 5. Data Exfiltration Mechanisms
5.1 Phase 1: Data Gathering Mechanisms
5.2 Phase 2: Data Transmission
References
Chapter 6. Maintaining Control and Lateral Movement
6.1 Maintaining Control
6.2 Lateral Movement and Network Reconnaissance
References
Chapter 7. Why Targeted Cyber Attacks Are Easy to Conduct?
7.1 Step 1: Building Targeted Attack Infrastructure
7.2 Step 2: Exploring or Purchasing Stolen Information About Targets
7.3 Step 3: Exploits Selection
7.4 Step 4: Malware Selection
7.5 Step 5: Initiating the Attack
7.6 Role of Freely Available Tools
References
Chapter 8. Challenges and Countermeasures
8.1 Real-Time Challenges
8.2 Countermeasures and Future Developments
References
Chapter 9. Conclusion
References
Abbreviations


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.84 SOO t
b0001330
Available - Available
Detail Information
Series Title
--
Call Number
005.84 SOO t
Publisher
Massachusetts : Syngress., 2014
Collation
xv, 142 hal.; ilus.; 23 cm
Language
English
ISBN/ISSN
9780128006047
Classification
005.84
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Computer security
Computer networks -- Security measures
Cyberspace -- Security measures
Computer crimes -- Prevention
Specific Detail Info
--
Statement of Responsibility
Aditya K Sood dan Richard Enbody
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?