Attribution of advanced persistent threats : how to identify the actors behind cyber-espionage /

Saved in:
Bibliographic Details
Main Author: Steffens, Timo (Author)
Corporate Author: ProQuest (Firm)
Format: Electronic eBook
Language:English
German
Published: Berlin, Germany : Springer Vieweg, [2020]
Subjects:
Online Access:Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)

MARC

LEADER 00000nam a2200000Ii 4500
001 b3824350
003 CStclU
005 20201213142340.3
006 m o d
007 cr cnu---unuuu
008 200730s2020 gw ob 001 0 eng d
020 |a 9783662613139  |q (electronic bk.) 
020 |a 3662613131  |q (electronic bk.) 
020 |z 3662613123 
020 |z 9783662613122 
024 7 |a 10.1007/978-3-662-61313-9  |2 doi 
035 |a (NhCcYBP)ebc6272272 
037 |a com.springer.onix.9783662613139  |b Springer Nature 
040 |a NhCcYBP  |c NhCcYBP 
041 1 |a eng  |h ger 
050 4 |a QA76.9.A25  |b S74 2020 
082 0 4 |a 005.8  |2 23 
100 1 |a Steffens, Timo,  |e author. 
245 1 0 |a Attribution of advanced persistent threats :  |b how to identify the actors behind cyber-espionage /  |c Timo Steffens. 
264 1 |a Berlin, Germany :  |b Springer Vieweg,  |c [2020] 
300 |a 1 online resource ( xiv, 201 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 0 |a Machine generated contents note:   |g 1.  |t Advanced Persistent Threats --   |g 1.1.  |t Advanced Persistent Threats --   |g 1.2.  |t Phases of Attacks by APTs --   |g 1.3.  |t Reconnaissance --   |g 1.4.  |t Delivery --   |g 1.5.  |t Installation --   |g 1.6.  |t Lateral Movement --   |g 1.7.  |t Exfiltration --   |g 1.8.  |t Erase Evidence --   |t References --   |g 2.  |t Attribution Process --   |g 2.1.  |t Why Attribution at All? --   |g 2.2.  |t Terminology for Describing Cyber-Attacks and Actors --   |g 2.3.  |t Levels of Attribution --   |g 2.4.  |t Attribution Phases --   |g 2.5.  |t Premises Used for Attribution --   |g 2.6.  |t MICTIC Framework --   |t References --   |g 3.  |t Analysis of Malware --   |g 3.1.  |t Attacker Perspective: Development of Malware --   |g 3.2.  |t Sources for Analysts --   |g 3.3.  |t Evidence from the Development Environment --   |g 3.4.  |t Analysis of Functionality --   |g 3.5.  |t Overview of Relevant Information Types --   |t References --   |g 4.  |t Attack Infrastructure --   |g 4.1.  |t Attacker Perspective: Managing the Control Server Infrastructure --   |g 4.2.  |t Public Information and Tools --   |g 4.3.  |t Active Scanning --   |g 4.4.  |t Overview of Relevant Information Types --   |t References --   |g 5.  |t Analysis of Control Servers --   |g 5.1.  |t Attacker Perspective: Using Control Servers --   |g 5.2.  |t Network Traffic --   |g 5.3.  |t Hard Disks --   |g 5.4.  |t Overview of Relevant Information Types --   |t References --   |g 6.  |t Geopolitical Analysis --   |g 6.1.  |t Attacker Perspective: Tasking --   |g 6.2.  |t Domestic and International Conflicts --   |g 6.3.  |t Economic Interests --   |g 6.4.  |t Analysis of Organizations' Roles and Missions --   |g 6.5.  |t Analysis of Organizational Structures --   |g 6.6.  |t Overview of Relevant Information Types --   |t References --   |g 7.  |t Telemetry-Data from Security Products --   |g 7.1.  |t Attacker Perspective: Awareness of Telemetry --   |g 7.2.  |t Types of Telemetry Data --   |g 7.3.  |t Use-Cases for Telemetry Data --   |g 7.4.  |t Overview of Relevant Information Types --   |t References --   |g 8.  |t Methods of Intelligence Agencies --   |g 8.1.  |t Attacker Perspective: Countering Counter-Intelligence --   |g 8.2.  |t OSINT-Open Source Intelligence --   |g 8.3.  |t General Signals Intelligence-SIGINT --   |g 8.4.  |t SIGINT About Cyber-Activity --   |g 8.5.  |t HUMINT-Human Intelligence --   |g 8.6.  |t Offensive Cyber-Operations-Hacking Back --   |g 8.7.  |t Requests to Providers --   |g 8.8.  |t Organizations Conducting Attribution --   |g 8.9.  |t Overview of Relevant Information Types --   |t References --   |g 9.  |t Doxing --   |g 9.1.  |t Attacker Perspective: The Online Identity --   |g 9.2.  |t Researching Persons Online --   |t References --   |g 10.  |t False Flags --   |g 10.1.  |t Attacker Perspective: Planting False Flags --   |g 10.2.  |t Analyzing False Flags --   |t References --   |g 11.  |t Group Set-Ups --   |g 11.1.  |t Pattern-Based Approach --   |g 11.2.  |t Group Templates Based on MICTIC Aspects --   |g 11.3.  |t Group Templates Based on Killchain Phases --   |t References --   |g 12.  |t Communication --   |g 12.1.  |t Audience and Purpose --   |g 12.2.  |t Presentation of Results --   |g 12.3.  |t Reaction to Disclosure --   |t References --   |g 13.  |t Ethics of Attribution --   |g 13.1.  |t Neutrality --   |g 13.2.  |t Consequences of Attribution --   |g 13.3.  |t Outing Individuals --   |g 13.4.  |t Possibility of Mistakes --   |t References --   |g 14.  |t Conclusion and Outlook --   |g 14.1.  |t Attribution as a Process --   |g 14.2.  |t Outlook --   |t Reference. 
533 |a Electronic reproduction.  |b Ann Arbor, MI  |n Available via World Wide Web. 
588 |a Description based on online resource; title from digital title page (viewed on August 18, 2020). 
650 0 |a Cyber intelligence (Computer security) 
710 2 |a ProQuest (Firm) 
776 0 8 |c Original  |z 3662613123  |z 9783662613122 
856 4 0 |u https://ebookcentral.proquest.com/lib/santaclara/detail.action?docID=6272272  |z Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)  |t 0 
907 |a .b38243507  |b 211018  |c 211018 
998 |a uww  |b    |c m  |d z   |e l  |f eng  |g gw   |h 0 
917 |a GOBI ProQuest DDA 
919 |a .ulebk  |b 2020-07-09 
999 f f |i 6e4dc9e6-729e-5660-8dfd-3feea291b7a7  |s aff164f9-c1bb-567f-b1e2-a47143a5aba4  |t 0