Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online
Authors: Sean Bodmer
Tags: #General, #security, #Computers
Gangsta Bucks group
Gates, Bill
GEN (generation)
generation (GEN)
geolocation vector
GFI EndPointSecurity tool
Ghost Busters
GhostNet APT
glossary
Google incidents
Chinese hackers
Gmail exploit
Google Scholar
goonies
Gribodemon
H
Hack Forums
hacked websites
hackers.
See also
attackers
antisocial behavior
carding communities
changing social structure of
Chinese hacking groups
demonization of
derogatory dimension
hacking for money
Hacktivist groups
magic/religion dimension
as meritocracy
motivation.
See
motivation
“patriotic hackers”
Russian hacking gangs
social networks.
See
social networks
social psychology
state-sponsored hackers
status position
taxonomies
technology dimension
hacking back
Hacktivist groups
Hanssen, Robert
Harper, Allen
Hazelwood, Roy
HBGary
Helms, Richard
HIDS (Host Intrusion Detection System)
High Orbit Ion Cannon (HOIC)
high-volume websites
HIPS (Host Intrusion Prevention System)
Hitler, Adolf
HMIs (human machine interfaces)
HOIC (High Orbit Ion Cannon)
Hollinger, Richard
Holt, Tom
homicides.
See also
murderers
honesty
honeyclients
honeygrids
Honeynet Project
honeynets
architecture
content filling
“defense-in-depth”
described
detection of
disabling of
Gen III
layers
legal issues
logs
objectives
production-based
purpose of
research-based
risks/issues
training for
violations
honeypots
considerations
content staging
described
evidence obtained via
example scenarios
layers
patch levels
tuned
honeywalls
accreditation
data analysis
data capture
data collection
data control
overview
horizontal phishing
host configuration
host content
Host Intrusion Detection System (HIDS)
Host Intrusion Prevention System (HIPS)
host profiles
host-based detection tools
host/server vulnerability tools
HTTP (Hypertext Transfer Protocol)
human information processing limits
Human Intelligence (HUMINT)
human machine interfaces (HMIs)
HUMINT (Human Intelligence)
humor
“Husbanding of Deception Assets”
Hussein, Sadam
Hüssy, Roman
Hypertext Transfer Protocol (HTTP)
I
IAD (Information Assurance Directorate)
IC3 (Internet Crime Complaint Center)
Ice-X bots
ID (identification)
IDA Pro tool
identification (ID)
IDSs (intrusion detection systems)
Immunet Pro tool
indications
inductive profiling
industrial espionage.
See
espionage
infection vectors
infector
Information Assurance Directorate (IAD)
Information Operations
information security, vetting
Information Technology (IT)
information vectors
Information Warfare
Information Warfare Manual (IWM)
Information Warfare Monitor (IWM)
infrastructure costs
“in-game currency”
injection vectors
integration
intellectual property
Internet Crime Complaint Center (IC3)
Internet Protocol (IP)
Internet Relay Chat (IRC)
Internet Service Providers (ISPs)
Internet value chain
Internet Worm
Internetworking Operating System (IOS)
interviewing techniques
intrusion detection systems (IDSs)
intrusion prevention systems (IPSs)
intrusions.
See also
attacks
postmortems
risk tolerance
timeliness aspect of
investigations
investigative techniques/tools
IOS (Internetworking Operating System)
IP (Internet Protocol)
IP addresses
IPSs (intrusion prevention systems)
Iraq invasion
IRC (Internet Relay Chat)
IRC chat logs
ISPs (Internet Service Providers)
IT (Information Technology)
IWM (Information Warfare Manual)
IWM (Information Warfare Monitor)
J
James, Lance
Jargon File
John the Ripper tool
Johnson, Samuel
joint/interagency operations
“Jones Dilemma”
jsunpack.jeek.org
Juniper Networks
Justia.com
K