Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

Buy

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--when did the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

About the Author
Mike Schiffman is the director of research and development at Guardent, the leading provider of professional security services. He has written for numerous technical journals, has written white papers, and has contributed to Hacking Exposed.
(HTML tags aren't allowed.)

The Fourth State of Matter
The Fourth State of Matter
A valuable book has become even better. It deserves a large market.
- Professor Falthammar

Many analogies to everyday life liven things up The book is strong on history, not only of plasma, but also of atomic physics and electromagnetism.
- E. Infeld, Journal of Plasma Physics

Plasma physics may hold the
...
A Practical Guide for SystemVerilog Assertions
A Practical Guide for SystemVerilog Assertions
When Gateway Design Automation, Inc. created Verilog in the mid- 1980's, the process of integrated circuit design was very different than it is today. The role of Verilog, as well as its capability, has evolved since its inception into today's SystemVerilog.

SystemVerilog language consists of three categories of...

Creating Web Portals with BEA WebLogic
Creating Web Portals with BEA WebLogic

Creating Web Portals with BEA WebLogic shows the beginning portal developer how to develop a portal application from start to finish, and supplies the intermediate developer with proven strategies and development techniques for creating an enterprise portal. It also provides the advanced Java application server developer with a full...


The Painter: A novel
The Painter: A novel

Peter Heller, the celebrated author of the breakout best seller The Dog Stars, returns with an achingly beautiful, wildly suspenseful second novel about an artist trying to outrun his past.

Jim Stegner has seen his share of violence and loss. Years ago he shot a man in a bar. His marriage disintegrated. He grieved the
...

Sport and the New Zealanders: A History
Sport and the New Zealanders: A History
Sport has played a central part in the social and cultural history of Aotearoa New Zealand throughout its history. This book tells the story of sport in New Zealand for the first time, from the Maori world to today’s professional athletes. Through rugby and netball, bodybuilding and surf lifesaving, the book introduces readers to...
Introduction to Reticular Chemistry: Metal-Organic Frameworks and Covalent Organic Frameworks
Introduction to Reticular Chemistry: Metal-Organic Frameworks and Covalent Organic Frameworks
A concise introduction to the chemistry and design principles behind important metal-organic frameworks and related porous materials

Reticular chemistry has been applied to synthesize new classes of porous materials that are successfully used for myraid applications in areas such as gas separation, catalysis, energy, and
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy