- Paperback: 356 pages
- Publisher: Syngress; 1 edition (June 2004)
- Language: English
- ISBN-10: 1931836116
- ISBN-13: 978-1931836111
- Product Dimensions: 7 x 0.9 x 9.2 inches
- Shipping Weight: 1.3 pounds (View shipping rates and policies)
- Average Customer Review: 2.4 out of 5 stars See all reviews (6 customer reviews)
- Amazon Best Sellers Rank: #330,653 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Cyber Adversary Characterization: Auditing the Hacker Mind 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Customers who bought this item also bought
About the Author
Tom is recognized throughout the security industry for his research in multiple areas including adversary profiling, industrial control systems security and software vulnerability research & analysis. Tom is a frequent speaker at security conferences including Black Hat. Tom often lends his time to guest lecturing at Universities, involvement in community research initiatives, and is often called to provide his expert opinion to mass media organizations, including BBC News, CNN, and online/print outlets such as The Register, Reuters News, Wired and Business Week. --This text refers to an out of print or unavailable edition of this title.
Browse award-winning titles. See more
If you are a seller for this product, would you like to suggest updates through seller support?
Top Customer Reviews
I highly recommend you avoid this book if you have an aversion to the gross butchering of the English language. I have found this book to be so far over the line of good writing that it is distracting. I haven't even been able to make it out of the second chapter! Sentence structures are unnecessarily complex and wordy. The text is replete with grammatical errors and misspellings. The author created terms to describe his concepts, yet the terms have other connotations, making it further difficult to understand. Parsing and understanding what the author is trying to say in certain passages is difficult at best. I'm sure if I had been in meetings with this author, I would know his language and intuitively understand what he means, but the new reader, devoid of that knowledge, is at a significant disadvantage. If this book had been properly edited, it would be about half its size. One has to ask what the publisher was thinking, or not.
This is most unfortunate. The threat of cyber attacks against national interests and critical infrastructure is very high. Having a book that proposes a systematic methodology to help identify and address those threats would be most useful.
But other chapters are poorly done. For example, Chapter 2 is on Theoretical Characterisation Metrics. It repeatedly uses various conditional probabilities, but with a wrong notation. For a probability of B given A, it uses p(B)/A. The standard notation is P(B|A). Used for decades in statistics course. First year undergraduate level.
Other chapters, presumably written by different people, do use the correct notation. But Chapter 3, on the Cyber Food Chain, has an even more disturbing flaw. It has tables of what it calls mean inhibitor values. Derived from sets of values with only 1 significant figure. But the means are given to 4 significant figures! At best, the means only have 2. What this author is doing is imputing a false accuracy of 2 extra significant figures, or 100 times greater than actuality. More strictly, it is probably close to 1000 times greater, because the mean is really no better than one significant figure.
So what? Well, given that the authors goof on such elementary steps, it should give you serious reservations about their more "sophisticated" operations, where they discuss various metrics.
Another thing. One chapter's title is mis-spelled on the top of every page in the chapter. Irritating. Makes one wonder about the proof reading.
Chapter breakout: Introduction; Theoretical Characterization Metrics; Disclosure and the Cyber Food Chain; Rating the Attack: Post-Incident Characterization Metrics; Asset Threat Characterization; Bringing It All Together: Completing the Cyber Adversary Model; WarmTouch: Assessing the Insider Threat and Relationship Management; Managing the Insider Threat; The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures; Characterizing the Extremes - Terrorists and Nation States; Return on Investment; Final Words; Glossary; Index
Most books that concern themselves with the "hacker mindset" do so with personality characterizations and attack methods. When you get done, you may understand how attacks occur, but you're no further along in doing a critical risk assessment of your particular environment. This book is the first I've seen that attempts to analyze the components mathematically in order to allow you to weight different scenarios against each other. The authors do a decent job in taking individual characteristics of the attacker, the environment, and the target, explaining how each component affects an attack scenario, and then giving a formula that can be used to assign a numeric value. While you may not agree with the interpretation, it's a rigorous approach to something that can be hard to quantify.
I haven't decided whether I approve of the WarmTouch chapter. It's a software package developed by the authors that attempts to chart threat assessment from a person based on email wording, actions, and other observed behavior. The idea is interesting, but I normally have issues with a book like this being used to push an author's product. I'll just say buyer beware in this case...
Bottom line... this would be a useful read for someone in security consulting and auditing, and would help an organization take a methodical view of their environment for risk assessment. There's not much on the book market like this volume.