Counterintelligence Through Malicious Code Analysis

Amazon Price: N/A (as of September 24, 2016 16:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses’ network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.

Product Details

  • File Size: 400 KB
  • Print Length: 106 pages
  • Simultaneous Device Usage: Unlimited
  • Publication Date: April 13, 2012
  • Sold by:  Amazon Digital Services LLC
  • Language: English
  • ASIN: B007U8GOC8
  • Text-to-Speech: Enabled
  • X-Ray: Not Enabled
  • Word Wise: Not Enabled
  • Lending: Enabled
  • Enhanced Typesetting: Enabled