SUSTAINABLE DEVELOPMENT
Innovate. Sustain. Transform.
Save up to 30% on top Physical Sciences & Engineering titles!

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber ter… Read more
SUSTAINABLE DEVELOPMENT
Save up to 30% on top Physical Sciences & Engineering titles!
Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways.
This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis.
This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.
Foreword
Preface
Acknowledgments
About the Authors
1. Cybercrime and Espionage and the New Security 101
Information in this chapter
Introduction
He Who Does Not Prevent a Crime When He Can, Encourages It
What’s Old Is New Again
A Changing World
Cybercriminal Statistics: U.S. and Abroad
The Statistics of Cybercrime
Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals
Trends in 2011
Myopic to the Catastrophic: Advanced Persistent Threats
Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and Espionage
Agendas in Next Generation Cybercriminal Activity
The Coming Decade
Summary
2. Evolution Revolution
Information in this chapter
Introduction
Communication
Criminal Activity
Summary
3. The Silent Killer: How Regulatory Compliance has Worsened the State of Information Security
Information in this chapter
Introduction
Regulatory Compliance Telemetry
Transborder Data Flow Restrictions
ISO Security Standards
Health Insurance Portability and Accountability Act (HIPAA)
Family Education Rights and Privacy Act (FERPA)
Payment Card Industry Data Security Standard (PCI DSS)
North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP)
Summary
References
4. Mediating the Great Divorce: The Convergence of Physical and Logical Security
Information in this chapter
Introduction
The CISSP Physical Security Domains
Environmental Security
The Silos of Security
Two-Factor Authentication
Converging the Great Physical Divide
Physical Device Security (Cryptography)
Proximity-Based Access Control
Summary
References
5. Nonstate Sponsored Attacks: Stealing Information is Our Business… and Business is Good
Information in this chapter
Introduction
Asymmetric Forms of Information Gathering
Blended Reconnaissance
Social Engineering and Social Networking
Point, Click, and Own
Summary
References
6. State-Sponsored Intelligence
Information in this chapter
Introduction
Espionage and Its Influence on Next-Generation Threats
Intelligence Types
Traditional Forms of Intelligence Gathering
Summary
7. Cyber X: Criminal Syndicates, Nation States, Subnational Entities, and Beyond
Information in this chapter
Introduction
Classifying the Cyber Actor
Attack Sophistication Model
Modus Operandi
The Importance of Attribution
Criminal and Organized Syndicates
Nation States
Subnational Entities
Summary
References
8. The Rise of the Subversive Multivector Threat
Information in this chapter
Introduction
Defining the Subversive Multivector Threat (SMT)
Summary
9. Seven Commonalities of Subversive Multivector Threats
Information in this chapter
Introduction
Seven Commonalities of Subversive Multivector Threats
Five Names in Threats You Should Know
Next-Generation Techniques and Tools for Avoidance and Obfuscation
Summary
References
10. Examples of Compromise and Presence of Subversive Multivector Threats
Information in this chapter
Introduction
Black, White, and Gray: Motives and Agendas of Cyber Actors with Respect to Cybercrime and Espionage
Onion Routed and Anonymous Networks
WikiLeaks
Project Aurora
Summary
11. Hiding in Plain Sight: Next-Generation Techniques and Tools for Avoidance and Obfuscation
Information in this chapter
Introduction
Malware Quality Assurance Testing
IP Attribution
IP Spoofing
Summary
References
12. Weapons of Our Warfare: Next-Generation Techniques and Tools for Detection, Identification, and Analysis
Information in this chapter
Introduction
Legacy Firewalls
Antivirus
Intrusion Detection Systems and Intrusion Prevention Systems
What Is in a Name?
MOSAIC
Advanced Meta-Network Security Analysis
Next Generation Security Framework
Summary
References
Index
WG
Will has deep expertise and knowledge in operations, analysis, management, professional services & consultancy, pre-sales / architecture and strong desire to see the industry mature and enterprises & individuals become more secure. Will is a long-standing member of the ISC2, ISACA, and ISSA. Mr.Gragido holds the CISSP and CISA certifications, as well as accreditations in the National Security Agency's Information Security Assessment Methodology (IAM) and Information Security Evaluation Methodology (IEM). Additionally, Mr.Gragido is a Faculty Member of the IANS Institute where he specializes in advanced threat, botnet, and malware analysis. Mr.Gragido is a graduate of DePaul University and is currently preparing for graduate school. An internationally sought after speaker, Will is the co-author of Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats.
JP
John extensive expertise in the Security field stems from past work experience with the US Intelligence Community, as Chief Technology Officer at CSG LTD, Product Manager at Cisco, Product Line Executive for all security products at IBM Internet Security Systems, Director at McAfee's Network Defense Business Unit, Director of Product Management at HP Enterprise Security Products, Chief Technology Officer at NSS Labs, Co-Founder and Chief Strategy Officer at Bricata, LLC and most recently as Director of Security Solutions for Forsythe Technology.
In addition to a BBA from the University of Texas, John also holds the NSA-IAM and CEH certifications. He has been named security thought leader from SANS Institute and speaks at top tier security conferences worldwide and has been published in Time Magazine, Bloomberg, CNN and other tier 1 media outlets.