Amazon Price: N/A (as of December 15, 2017 02:52 –
Among our Nation's critical infrastructures, the Energy Sector is a primary target for exploitation by nation state and mercenary APTs, hacktivists, cyber jihadists and other hacker teams. Although the nation's socioeconomic survival depends on the energy sector to deliver energy to the homes and businesses that support life, business operations, and critical systems, it was not built upon a foundation of security and cyber-resiliency, making it highly vulnerable to attack. To develop truly viable defenses, conversations about energy sector resiliency must focus more on details about actors, malware and evolving attack vectors.
In this publication, the Institute for Critical Infrastructure Technology offers a detailed analysis of the expanding threat landscape within the energy sector as well as profiles on the most prominent actors targeting our Nation's energy grid.
Continue reading “The Energy Sector Hacker Report: Profiling the Hacker Groups That Threaten Our Nation's Energy Sector”
Amazon Price: $40.00 $38.39 You save: $1.61 (4%). (as of December 14, 2017 18:08 –
According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors’ advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors’ objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.
Amazon Price: N/A (as of December 14, 2017 20:00 –
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered onLinux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.Do you watch for all types of ICMP traffic–some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.
Amazon Price: $999.00 (as of unknown date –
MetaGeek Wi-Spy DBx Pro – Wireless network detector – 802.11 a/b/g/n
Amazon Price: $54.99 $38.07 You save: $16.92 (31%). (as of December 15, 2017 00:03 –
This SpringerBrief gives the reader a detailed account of how cybersecurity in Israel has evolved over the past two decades. The formation of the regions cybersecurity strategy is explored and an in-depth analysis of key developments in cybersecurity policy is provided.
The authors examine cybersecurity from an integrative national perspective and see it as a set of policies and actions with two interconnected goals: to mitigate security risks and increase resilience and leverage opportunities enabled by cyber-space.
Continue reading “Cybersecurity in Israel (SpringerBriefs in Cybersecurity)”