Cyberspace, where information–and hence serious value–is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
The unfortunate events of September 11, 2001 have caused a renewed effort to protect our Nation’s Critical Infrastructures. SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure and their importance was reinforced during the massive power outage that occurred in August 2003. Growing reliance upon the Internet has emphasized the vulnerability of SCADA system communications to cyber attack. Only through diligent and continuous vulnerability assessment and certification and accreditation of these systems will the United States be able to mitigate some of the vulnerabilities of these systems. A case study presented here has validated the need for continued focus in this area. This thesis consolidates some of the research that has already been done in the area of SCADA vulnerability assessment and applies it by developing an initial vulnerability assessment checklist for Department of the Navy systems. This checklist can and should also be used in the certification and accreditation of DoN SCADA systems. A promising technology was also discovered during this research that should be explored further to secure SCADA communications. This will be touched on briefly.
Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security mechanisms have given rise to new trends and techniques of compromising a network. This book deals with these recent trends and attack tips to compromise the weakest to the strongest of networks. Metasploit Exploitation and Development describes actual penetration testing skills and ways to penetrate and assess different types of networks.
Continue reading “Learning Metasploit Exploitation and Development”
This is the #1 Bestselling Cisco Firepower book on the market! The definitive guide to FTD installation, tuning and troubleshooting!
Learn how to administrate a Cisco Firepower with Firepower Threat Defense (FTD) system!
Understand Cisco's Threat-Focused Next Generation Firewall (NGFW) using Best-Practices
The Cisco NGFW/IPS is the the industries best security product, so now is the time to up your skills with with Cisco's Firepower technologies.
Learn step-by-step with the worlds leading Firepower experts, Todd Lammle and Alex Tatistcheff, on how you can configure, maintain, troubleshoot and analyze your network with easy, detailed instructions on each security policy.
All Firepower/FTD policies covered, including IPS/Snort, SSL, DNS, Pre-filter, Identity, Firepower Network Discovery, FTD Platform, QoS, Interfaces, Subinterfaces, Routing, Correlation, File & Malware, Access Control, Network Analysis Policy, and more!
INTERCEPT is the previously untold – and previously highly classified – story of the melding of technology and espionage. Gordon Corera's compelling narrative, rich with historical details and characters, takes us from the Second World War to the internet age, with astonishing revelations about espionage carried out today. The computer was born to spy. Under the intense pressure of the Second World War and in the confines of Britain's code-breaking establishment at Bletchley Park, the work of Alan Turing and others led to the birth of electronic espionage. It was a breakthrough that helped win the war. In the following decades, computers transformed espionage from the spy hunting of the Cold War years to the data-driven pursuit of terrorists and the industrial-scale cyber-espionage against corporations in the twenty-first century. Together, computers and spies are shaping the future, and from the rise of China to the phones in our pockets, what was once the preserve of a few intelligence agencies now matters for us all. Drawing on unique access to Western intelligence agencies, on the ground reporting from China and insights into the most powerful technology companies, Corera has gathered compelling stories from heads of state, hackers and spies of all stripes. INTERCEPT is a ground-breaking exploration of the new space in which the worlds of espionage, geopolitics, diplomacy, international business, science and technology collide.