Malware, Rootkits & Botnets A Beginner's Guide

Malware, Rootkits & Botnets A Beginner's Guide

Christopher C. Elisan

Language: English

Pages: 432

ISBN: 0071792066

Format: PDF / Kindle (mobi) / ePub


Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started protecting your network right away.

Malware, Rootkits & Botnets: A Beginner's Guide features:

  • Lingo--Common security terms defined so that you're in the know on the job
  • IMHO--Frank and relevant opinions based on the author's years of industry experience
  • Budget Note--Tips for getting security technologies and processes into your organization's budget
  • In Actual Practice--Exceptions to the rules of security explained in real-world contexts
  • Your Plan--Customizable checklists you can use on the job now
  • Into Action--Tips on how, why, and when to apply new skills and techniques at work

Computer Evidence - Collection and Preservation, Second Edition

Web Application Security: A Beginner's Guide

Computer Forensics: Investigating Wireless Networks and Devices (Ec-Council Press Series: Computer Forensics)

The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You.

Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics)

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Malware. Some classify them based on behavior, based on their target platform, or based on their attack directive. In this section, we will classify malware based on their behavior, with the exception of mobile malware, wherein we will treat it as a specific class of malware that infects mobile devices, a classification based on its target platform. The different classes of malware are Infectors Network worms Trojan horse Backdoors Remote access Trojans Information stealers Ransomware.

Enough. A battalion commander will not let his soldiers go to the battlefield without any protection. They are not only armed to the teeth, but also have with them the most advanced protective gear to protect them from enemy fire. Same with an army of malware—malware that is deployed for infection, no matter how many and how different they are, without the proper armor, when captured, can be easily analyzed. The army needs armor. Before, the process of armoring malware was done by coding the.

Of a legitimate domain. So in this example, an attacker can register www.citibsnk.com and then make it appear like the original by copying the exact look of the original website. The attacker can then use this website in many malicious ways, which can include phishing for financial credentials or as an infection vector for spreading malware. Links that are used as infection vectors can be any of the following: Direct link to a malicious file (e.g., www.baddomain.info/malware.exe). The malicious.

How liquid is the data? Can it be sold easily to the public or is it only valuable to a specific group or audience? For example, a system that contains credit card information of customers contains very liquid data. Tip Stored data must be encrypted if possible, so, even if it is stolen, the bad guys won’t be able to use or sell it. The data will prove useless to the attackers, unless, of course, they have the ability to decrypt it. Users of the System As previously discussed, the access.

That will likely result in an infection. One example of this is Microsoft’s HoneyMonkey, aka Strider HoneyMonkey Exploit Detection System. As defined by Microsoft, Strider HoneyMonkey is a Microsoft Research project that detects and analyzes websites hosting malicious code. The intent is to help stop attacks that use web servers to exploit unpatched browser vulnerabilities and install malware on the computers of unsuspecting users. Honeypot Deployment Locations   These honeypots are often.

Download sample

Download