About us | Advertising | SecurityWatch
Home ? Articles ? Blog ? Reviews ? Press Releases ? Security Tools ? Sponsored Solutions
Press Releases
Syngress Publishing Announces the Release of "Cyber Adversary Characterization: Auditing the Hacker Mind"
Wednesday, 4 August 2004 17:08 EST

Written by Experts Formerly with the FBI, US Army, Department of Homeland Security and Department of Defense

Rockland, MA--Syngress Publishing, Inc., today announced the publication of "Cyber Adversary Characterization: Auditing the Hacker Mind" (ISBN: 1-931836-11-6).

The use of and reliance upon computers and the Internet has become widespread in recent years. As a result, the world is now faced with an increased risk of cybercrime. The information in "Cyber Adversary Characterization" will show security and cyber-terrorist specialists how to develop a well-designed plan to combat hackers. The book will unveil how much you may or--more importantly--may not know about the types of adversaries that are out there. "Cyber Adversary Characterization" is essential for those who want to ensure a secure a network.

Andrew Williams, Vice President, Syngress Publishing, said, "We all know that cybercrime has become an all too real threat--from a 'hacktivist' concerned with worldly politics and agendas, to a script kiddie looking for a little fun, criminal hackers are as varied as they are skilled. Recognizing and understanding these adversaries and the potential threats they pose is key to securing any network. Cyber Adversary Characterization answers the questions: Who are the hackers?, What do they want to hack?, and Why they want to hack it?"

The authors of the book are Tom Parker, Matthew Devost, Marcus Sachs, Eric Shaw, and Ed Stroz.

"By providing recent case studies and profiles of various cyber-terrorists, this is the must-have guide book for understanding the world of hackers," said Ed Stroz, President of Stroz Friedberg, LLC. "Based on our real-life experience, we provide the tools for readers to recognize who or what is a cyber adversary and offer the best protection against them."

Chapter topics include: Disclosure and the Cyber Food Chain; Rating the Attack: Post-Incident Characterization Metrics; Asset Threat Characterization; Managing the Insider Threat; The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures; Characterizing the Extremes-Terrorists and Nation States; and Return on Investment.

"Cyber Adversary Characterization" is now available in bookstores and at online retailers.

BOOK DETAILS
ISBN: 1-931836-11-6
PRICE: $49.95 U.S.
PAGE COUNT: 358 PP

About the Authors
Tom Parker is one of Britain's most highly prolific security consultants. In addition to providing integral security services for some of the world's largest organizations, Tom is widely known for his vulnerability research on a wide range of platforms and commercial products. His more recent technical work includes the development of an embedded operating system, media management system and cryptographic code for use on digital video band (DVB) routers.

Matthew G. Devost is President and CEO of the Terrorism Research Center, Inc., overseeing all research, analysis and training programs. He has been researching the impact of information technology on national security since 1993. Matthew is certified in the National Security Agency's INFOSEC Assessment Methodology and is an instructor for the Threat, Exposure and Response Matrix (TERM) methodology. He has appeared on CNN, MSNBC, FoxNews, NPR, CBS Radio, BBC television, and NWCN.

Marcus H. Sachs is the Director of the SANS Internet Storm Center and is a cyberspace security researcher, writer, and instructor for the SANS Institute. He previously served in the White House Office of Cyberspace Security and was a staff member of the President's Critical Infrastructure Protection Board. While a member of the White House staff, Marcus coordinated efforts to protect and secure the nation's telecommunication and Internet infrastructures, leveraging expertise from United States government agencies, the domestic private sector, and the international community. He also contributed to the National Strategy to Secure Cyberspace, upon his joining of the National Cyber Security Division of the US Department of Homeland Security.

Eric Shaw is a clinical psychologist who has spent the last 20 years specializing in the psychological profiling of political actors and forensic subjects. He has provided cross-cultural profiling for the U.S. government on the psychological state and political attitudes of figures such as Saddam Hussein, Iranian revolutionary leaders under Khomeini, senior Soviet military commanders, as well as Yugoslav, Laotian, Cuban and other military and political leaders.

Ed Stroz is President of Stroz Friedberg, LLC, which he started in 2000 after a sixteen-year career as a Special Agent for the Federal Bureau of Investigation. Stroz Friedberg performs investigative, consulting, and forensic laboratory services for major law firms and large corporations. In 1996, he formed the FBI's Computer Crime Squad in New York City, where he supervised investigations involving computer intrusions, denial-of-service attacks, illegal Internet wiretapping, fraud, money laundering, and violations of intellectual property rights, including trade secrets. Among the more significant FBI investigations Ed handled were Vladimir Levin's prosecution for hacking a US bank from Russia and the hack against the "New York Times" web site.

Background Information
Syngress Publishing (www.syngress.com), headquartered in Rockland, Massachusetts, is an independent publisher of print and electronic reference materials for Information Technology professionals seeking skill enhancement and career advancement. Distributed throughout Europe, Asia, the U.S. and Canada, Syngress titles have been translated into twenty languages. The company's pioneering customer support program, , extends the value of every Syngress title with regular information updates and customer-driven author forums. For more information on Syngress products, contact Amy Pedersen at or email . Syngress books are distributed in the United States and Canada by O'Reilly Media Inc.



Featured Articles

In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.

VoIP Telephony: Benefits for Businesses
Voice-over-Internet Protocol, or VoIP service, has been talked about for a number of years but is now being adopted by mainstream businesses in order to save money as well as deploy powerful new capabilities for end-users.

Review: SmartLine DeviceLock
Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security breaches at the network end-points.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year
Symantec Readies Urgent Patch

Copyright ? IT-Observer.com 2000 - 2005 ?? Privacy Policy | RSS Feeds
Site Meter