Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 359 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
359
Dung lượng
4,15 MB
Nội dung
[...]... illusion accepted by consensus and treated as if it is real www.syngress.com xvi Preface Hackers do not live in consensus reality Hackers see through it, hackers undermine; they exploit consensus reality Hackers see context as content— they see the skull behind the grin Hackers do not accept illusions.The best hackers create them and lead the rest of us in circles by our virtual noses So if you do... call distributed non-state actors or nongovernment global entities Legal distinctions, which it seemed to hackers and those who mythologized cyberspace as a new frontier, cyberspace hanging in the void above meat space, all legal distinctions would cease to exist in that bubble world, because hackers thought they were obliterated by new technologies Instead they were reformulated for the new space... is a book about everything First, the meaning of hacker The word hacker emerged in an engineering context and became popular at The Massachusetts Institute of Technology (MIT), among other places, as a way to talk about any ingenious, creative, or unconventional use of a machine doing novel things, usually unintended or unforeseen by its inventors A hacker was someone involved in a technical feat... pioneers, then the merchants, and at last, the lawyers Once the lawyers show up, the game is over A smaller group, a subset of those real hackers—people who entered and looked around or stole information or data—became defined as “hackers” by the media Now the word hacker is lost forever except to designate criminals, and a particular kind of criminal at that—usually a burglar—and the marks of hacking... seen as children’s games.The game moved online and spanned the global network Instead of playing digital games in an analogue world, hackers discovered that the world was the game because the world had become digital Creativity flourished and a hacker meritocracy emerged in cyberspace, in networks defined by bulletin boards and then web sites In, that is, the “real world” as we now know it But as the boundaries... Nation State Cyber Adversary 232 Nation State Cyber Adversary Attractors 233 Low Cost 233 Timely and Not Location Specific 233 Anonymity 234 Minimal Loss of Human Life 234 First Strike Advantage 235 Offensive Nature of Information Warfare 236 Nation State Cyber Adversary... is Cyber- crime has become an all too real threat with the rapid growth and increased reliance on computers and the Internet From a “hacktivist” concerned with worldly politics and agendas, to a script kiddie looking for a little fun, criminal hackers are as varied, as they are skilled Recognizing and understanding these adversaries and the potential threats they pose is key to securing any network Cyber. .. threats they pose is key to securing any network Cyber Adversary Characterization: Auditing the Hacker Mind answers:Who is the hacker, what do they want to hack, and why do they want to hack it More than just a collection of anecdotes and speculation, the authors provide recent case studies and profiling of cyber- terrorists including attacks from state-sponsored groups to unhappy employees on the inside... xxvii Chapter 1 Introduction 1 Cyber Adversary Characterization 2 Case Study 1: A First-Person Account from Kevin D Mitnick 4 “I Put My Freedom on the Line for Sheer Entertainment …” 4 Case Study 2: Insider Lessons Learned 7 Cyber Terrorist: A Media Buzzword? 8 Failures of... Probability of Success Given an Attempt (p(S)/A) 46 Summary 48 Chapter 3 Disclosure and the Cyber Food Chain 49 Introduction 50 Vulnerability Disclosure and the Cyber Adversary 50 “Free For All”: Full Disclosure 51 “This Process Takes Time” 53 Disclosure Attack Capability . real. Hackers do not live in consensus reality. Hackers see through it, hackers undermine; they exploit consensus reality. Hackers see context as content— they see the skull behind the grin. Hackers. to hackers and those who mythologized cyberspace as a new frontier, cyberspace hanging in the void above meat space, all legal distinctions would cease to exist in that bubble world, because hackers. Membership to 296 _Cyber_ Adv_FM.qxd 6/16/04 4:13 PM Page i This page intentionally left blank Tom Parker Matthew G. Devost Marcus H. Sachs Eric Shaw Ed Stroz AUDITING THE HACKER MIND Cyber Adversary Characterization 296 _Cyber_ Adv_FM.qxd