Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

Buy

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--when did the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

About the Author
Mike Schiffman is the director of research and development at Guardent, the leading provider of professional security services. He has written for numerous technical journals, has written white papers, and has contributed to Hacking Exposed.
(HTML tags aren't allowed.)

New Perspectives on HTML, XHTML, and XML (New Perspectives)
New Perspectives on HTML, XHTML, and XML (New Perspectives)

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that the World Wide Web has to offer.

Our goal in developing the New Perspectives Series was to create books that give students the software concepts...

Maoism: A Global History
Maoism: A Global History
*** WINNER OF THE 2019 CUNDILL HISTORY PRIZE
SHORTLISTED FOR THE BAILLIE GIFFORD PRIZE FOR NON-FICTION 2019
SHORTLISTED FOR THE NAYEF AL-RODHAN PRIZE FOR GLOBAL UNDERSTANDING
SHORTLISTED FOR DEUTSCHER PRIZE
LONGLISTED FOR THE 2020 ORWELL PRIZE FOR POLITICAL WRITING***
...
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth Application Programming with the Java APIs (The Morgan Kaufmann Series in Networking)
Bluetooth® wireless technology is a short-range radio standard that provides new opportunities for wireless devices. This radio standard was designed originally as a way of eliminating the cables currently attached to nearly all consumer electronic devices. However, the goals for Bluetooth wireless technology grew as its designers recognized...

Nazi Germany and the Jews, 1933-1945: Abridged Edition
Nazi Germany and the Jews, 1933-1945: Abridged Edition

Nazi Germany and the Jews, 1933-1945 is an abridged edition of Saul Friedländer's definitive Pulitzer Prize-winning two-volume history of the Holocaust: Nazi Germany and the Jews: The Years of Persecution, 1933-1939 and The Years of Extermination: Nazi Germany and the Jews, 1939-1945.

The book's...

Geographic Data Mining and Knowledge Discovery, Second Edition
Geographic Data Mining and Knowledge Discovery, Second Edition

Similar to many research and application fields, geography has moved from a datapoor and computation-poor to a data-rich and computation-rich environment. The scope, coverage, and volume of digital geographic datasets are growing rapidly. Public and private sector agencies are creating, processing, and disseminating digital data on land use,...

Type 2 Diabetes: Principles and Practice, Second Edition
Type 2 Diabetes: Principles and Practice, Second Edition

The incidence and prevalence of type 2 diabetes mellitus have increased dramatically in modernized and developing nations over the past few decades. Thoroughly revised and expanded, this Second Edition responds to the epidemic and supplies a current overview and guide to the management of diabetes in the modern healthcare environment. This...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy