Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online
Authors: Sean Bodmer
Tags: #General, #security, #Computers
Kaspersky, Eugene
kernel exploits
Kernelmode.info
website
Kilger, Max
KisMAC tool
Kismet tool
knowledge source
Kosovo-hackers Group
Kretschmer, Ernst
L
L0pht group
l33t hackers website
Larkin, Paul
laughing out loud (LOL)
law.
See
legal issues
law enforcement, British
law enforcement (LE) agencies
“law of small numbers”
lawyers.
See also
legal issues
communicating with
working with
LE (law enforcement) agencies
legal issues.
See also
lawyers
conclusion
ethics in cyberspace
finding laws/statutes
hacking back and
honeypots/honey/nets
interpreting laws/statutes
investigations
legal terms
online legal resources
research
role of laws/statutes
statutes
legislative history
liaisons
linguistics
link analysis
Linux-Hacker.net
website
listening skills
Locard, Edmond
Lockheed Martin
logs
activity
antivirus
firewalls
honeyclients
honeynets
IDS/IPS
investigating
IRC chat
monitoring
network traffic
router
server/workstation
LOIC (Low Orbit Ion Cannon)
LOL (laughing out loud)
Lombroso, Cesare
Long Tail principles
LOVELETTER worm
Low Orbit Ion Cannon (LOIC)
LULZ
LulzSec attacks
LulzSec group
lying
M
macro-level analyses
“Mad Bomber” case
magic/religion dimension
“Magruder’s principle”
makecrafters
Malc0de Database
malicious loaders
malicious URLs
malvertising
malware
e-mail and
“tall tale”
against world governments
Malware Analysis System
malware authors
malware backdoor
Malware Domain List
Malware Protection Cloud
Malware URL repository
Manning, Bradley
marauders
Markoff, John
Maskirovka deception
MEECES acronym
Message Exchanger (MX)
metadata
Metasploit tool
Metesky, George
methods/skills
metrics
Meyers, Carol
Michael, Glyndwr
micro-level analyses
Microsoft
Microsoft Malware Protection Center
Microsoft Network Monitor
MILDEC (Military Deception)
Military Deception (MILDEC)
military organizations
Mitnick, Kevin
money
monitoring
Moonlight Maze APT
Morgan Stanley
Morris, Robert
motivation
analysis of
cause
changes to
ego
entertainment
entrance to social groups
money
as profiling tool
status
motivation vector
motives/intent
Mt. Gox
Mudge
“Multiple Forms of Surprise”
murder cases
murderers
MX (Message Exchanger)
MySpace
N
National Counterintelligence Executive (NCIX)
National Security Agency (NSA)
NCIX (National Counterintelligence Executive)
Nessus tool
NetStumbler tool
Network Threat Behavior Analysis
network-based detection tools
networks
analyzing
“battle terrain”
enterprise
improving security of
layout
management issues
physical access to
social
traffic
value
wireless
Next Generation Network Protection
Night Dragon event
NIPRNET
Nolo.com
Norman Endpoint Protection tool
Northrup Grumman
NSA (National Security Agency)
O
objectives
objects.
See
evidential objects
observables
actions
attack origination points
described
knowledge source
numbers involved in attack
objectives
postmortem breakdown
proactive breakdown
rankings
resources