Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science.
This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.
The Content
- Advanced Persistent Threats
- The attribution process
- Analysis of malware
- Attack infrastructure
- Analysis of control servers
- Geopolitical analysis
- Telemetry - data from security products
- Methods of intelligence agencies
- Doxing
- False flags
- Group set-ups
- Communication
- Ethics of attribution
The Target Audience
- IT-security professionals
- International relations researchers
- Technical journalists
- Employees of organizations that are targeted by Advanced Persistent Threats
The Author Dr. Timo Steffens was involved in the analysis of many of the most spectacular cyber-espionage cases in Germany. He has been tracking the activities and techniques of sophisticated hacker groups for almost a decade.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.