Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online
Authors: Sean Bodmer
Tags: #General, #security, #Computers
AV logs
AV tools
AV Tracker
B
balance of power
Barboz, David
Basic Input/Output Systems (BIOS)
Behavioral Analysis Units
behavioral profiling
Bencivenga, Angelo
bias
bill number
bills
BIOS (Basic Input/Output Systems)
Bitcoin currency
blackhat community
Blackhole exploit kits
blacklists
blocking
bluffing
Bodmer, Sean
Bongardt, Steve
booting computer
botnet masters
botnet operators (goonies)
botnets
Citadel
Ice-X
overview
SpyEye
Stormworm
subleasing
Zeus
BPH (bulletproof hosting)
Brenner, Joel (Dr.)
British law enforcement
Brussel, James
bulletproof hosting (BPH)
Byzantine Hades APT
C
Cain & Able tool
Canadian Dow Chemical
Candor APT
Canter, David
carding communities
career criminals
Carrier Service Provider (CSP) tools
cause, as motivation
CCI (cyber counterintelligence)
CCTV (closed circuit television)
CDs, automount
censorship
center of gravity (COG)
centralized planning/control
channel capacity
chapter
chaptered
characterization.
See
attack characterization
Chief Information Officer (CIO)
Chief Security Officer (CSO)
Chiesa, Raoul
China
Chinese counterintelligence
Chinese government
Chinese hacking groups
Chinese Information Warfare doctrine
Chinese state-sponsored hackers
Chinese-backed attacks
“Choice of Types” deception
CI (counterintelligence)
CIA (criminal investigative analysis).
See also
profiling
CIO (Chief Information Officer)
circle theory
circles of trust
Cisco Systems, Inc.
Citadel bot
citations
civilian cyber warrior
ClamAV tool
classification/dissemination rules
Clean MX data repository
client-side exploits
closed circuit television (CCTV)
clues
CnC (Command and Control)
CnC back-end server
COA (Course of Action)
codes.
See also
statutes
COG (center of gravity)
cognitive psychology
collected intelligence
collection planning
collection/analysis
Command and Control.
See
CnC
communication skills
communications, socially meaningful
commuters
computer crime.
See
cyber crimes
computer security.
See also
security
boot issues
importance of
physical security
vetting
computers
automounting
bootup of
physical access to
Conficker virus
consistency
Contagio Malware Dump
context staging
copyrights
Core Impact tool
counterintelligence.
See also
cyber counterintelligence
anonymity and
applying to cyber realm
asset validation
Chinese
classification/dissemination rules
collection/analysis
conclusion
considerations
countermeasures
double agent operations
fundamental competencies
interviewing/debriefing techniques
joint/interagency operations
key points
observables
relationships
reporting procedures/methods
research/technology protection
risk assessment
Russian
sizing up APTs
survelliance/countersurveillance
terminology
United States
“whack and tag a mole”
counterintelligence (CI)
countermeasures
countersurveillance
coup stick
Course of Action (COA)
cowpens
crimes.
See
cyber crimes
crimeware/analysis detection systems
criminal investigative analysis (CIA).
See also
profiling criminals
career
hacking into infrastructure
profiling.
See
profiling
Russian Business Network
skill level
teams of
tools/techniques
violent
CSO (Chief Security Officer)
CSP (Carrier Service Provider) tools
CTA (cyber threat acquisition)
Cyber Adversary Characterization
cyber counterintelligence (CCI).
See also
counterintelligence
cyber crimes
four epochs in
geographic details
motivation for.
See
motivation
reported
skill level
social networks.
See
social networks
time of
cyber currency
cyber espionage
cyber profiling
cyber threat acquisition (CTA)
cyber warfare
cyber warrior
cyberspace
considerations
ethics in
role of
D