The Rootkit Arsenal

Escape and Evasion in the Dark Corners of the System


Author: Bill Blunden

Publisher: Jones & Bartlett Publishers

ISBN: 144962636X

Category: Computers

Page: 783

View: 7792

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: -Evade post-mortem analysis -Frustrate attempts to reverse engineer your command & control modules -Defeat live incident response -Undermine the process of memory analysis -Modify subsystem internals to feed misinformation to the outside -Entrench your code in fortified regions of execution -Design and implement covert channels -Unearth new avenues of attack

Cyber Conflict

Competing National Perspectives


Author: Daniel Ventre

Publisher: John Wiley & Sons

ISBN: 1118562747

Category: Computers

Page: 352

View: 6405

Today, cyber security, cyber defense, information warfare andcyber warfare issues are among the most relevant topics both at thenational and international level. All the major states of the worldare facing cyber threats and trying to understand how cyberspacecould be used to increase power. Through an empirical, conceptual and theoretical approach, CyberConflict has been written by researchers and experts in the fieldsof cyber security, cyber defense and information warfare. It aimsto analyze the processes of information warfare and cyber warfarethrough historical, operational and strategic perspectives of cyberattack. It is original in its delivery because of itsmultidisciplinary approach within an international framework, withstudies dedicated to different states – Canada, Cuba, France,Greece, Italy, Japan, Singapore, Slovenia and South Africa –describing the state’s application of information warfareprinciples both in terms of global development and“local” usage and examples. Contents 1. Canada’s Cyber Security Policy: a Tortuous Path Towarda Cyber Security Strategy, Hugo Loiseau and Lina Lemay. 2. Cuba: Towards an Active Cyber-defense, Daniel Ventre. 3. French Perspectives on Cyber-conflict, Daniel Ventre. 4. Digital Sparta: Information Operations and Cyber-warfare inGreece, Joseph Fitsanakis. 5. Moving Toward an Italian Cyber Defense and Security Strategy,Stefania Ducci. 6. Cyberspace in Japan’s New Defense Strategy, DanielVentre. 7. Singapore’s Encounter with Information Warfare: FilteringElectronic Globalization and Military Enhancements, AlanChong. 8. A Slovenian Perspective on Cyber Warfare, Gorazd Praprotnik,Iztok Podbregar, Igor Bernik and Bojan Ticar. 9. A South African Perspective on Information Warfare and CyberWarfare, Brett van Niekerk and Manoj Maharaj. 10. Conclusion, Daniel Ventre