Cyber Adversary Characterization: Auditing the Hacker Mind by Tom ParkerCyber Adversary Characterization: Auditing the Hacker Mind by Tom Parker

Cyber Adversary Characterization: Auditing the Hacker Mind

byTom Parker, Marcus Sachs, Eric Shaw

Paperback | August 14, 2004

Pricing and Purchase Info

$73.83 online 
$75.95 list price
Earn 369 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.

* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.
Tom Parker is a computer security analyst who, along side his work for some of the world's largest organizations, providing integral security services is widely known for his vulnerability research on a wide range of platforms and commercial products. His more recent work includes the development of an embedded operating system, m...
Title:Cyber Adversary Characterization: Auditing the Hacker MindFormat:PaperbackDimensions:512 pages, 9 × 7 × 0.68 inPublished:August 14, 2004Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1931836116

ISBN - 13:9781931836111

Look for similar items by category:


Table of Contents

Foreword by Jeff Moss
Chapter 1: Introduction
Chapter 2: Theoretical Characterization Metrics
Chapter 3: Disclosure and the Cyber Food Chain
Chapter 4: Rating the Attack: Post-Incident CharacterizationMetrics
Chapter 5: Asset Threat Characterization
Chapter 6: Bringing It All Together: Completing the CyberAdversary Model
Chapter 7: WarmTouch: Assessing the Insider Threat andRelationship Management
Chapter 8: Managing the Insider Threat
Chapter 9: The Cyber Adversary in Groups: Targeting Nations'Critical Infrastructures
Chapter 10: Characterizing the Extremes-Terrorists andNation States
Chapter 11: Conclusions
Chapter 12: Return on Investment