عرض عادي

Seven deadliest USB attacks / Brian Anderson, Barbara Anderson ; technical editor, Andrew Rabie.

بواسطة:نوع المادة : نصنصالسلاسل:Syngress seven deadliest attacks seriesالناشر:Burlington, MA : Syngress, [2010]تاريخ حقوق النشر: copyright 2010وصف:xiv, 222 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781597495530 (pbk)
  • 1597495530 (pbk)
عنوان آخر:
  • 7 deadliest USB attacks
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 A52 2010
المحتويات:
Chapter 1. USB Hacksaw -- Sharing Away Your Future -- Anatomy of the Attack -- Universal Serial Bus -- U3 and Flash Drive CD-ROM Emulation -- Inside the Hacksaw Attack -- Hacksaw Removal -- What Is the Big Deal? -- Regulators, Mount Up -- Evolution of the Portable Platform -- Portable Platforms -- Hacksaw Development -- Defending against This Attack -- Summary -- Endnotes -- Chapter 2. USB Switchblade -- Passing Grades -- Inside the Switchblade -- Switchblade Tool Summaries -- Switchblade Assembly -- Why Should I Care? -- Evolving Aspects -- Privilege Elevation -- Defensive Techniques -- System Execution Prevention and USB Antidote -- Biometrics and Token Security -- Password Protection Practices -- Windows Group Policy Options -- Browser Settings and Screen Savers -- Summary -- Chapter 3. USB-Based Virus/Malicious Code Launch -- Invasive Species among Us -- An Uncomfortable Presentation -- Anatomy of the Attack -- Malicious Code Methodologies -- Autorun -- How to Recreate the Attack -- Evolution of the Attack -- Why All the Fuss? -- Botnets -- Distributed Denial-of-Service Attacks -- E-mail Spamming -- Infecting New Hosts -- Identity Theft -- Transporting Illegal Software -- Google AdSense and Advertisement Add-On Abuse -- Defending against This Attack -- Antimalware -- Summary -- Endnotes -- Chapter 4. USB Device Overflow -- Overflow Overview -- Analyzing This Attack -- Device Drivers -- Going with the Overflow -- USB Development and the Hole in the Heap -- Ever-Present Exposures -- Overflow Outlook -- Defensive Strategies -- Drivers -- Physical Protection Mechanisms -- Summary -- Endnote -- Chapter 5. RAM dump -- Gadgets Gone Astray -- Digital Forensic Acquisition Examination -- Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics? -- Memory Gatherings -- Reconstructing the Attack -- Mind Your Memory -- Advancements in Memory Analysis -- ManTech DD -- Additional Analysis Tools -- Future Memories -- The Room with an Evil View -- Hindering the Gatherers -- Security Framework, Programs, and Governance -- Trackers and Remote Management -- BIOS Features -- Trustless Execution Technology and Module Platform -- Enhancing the Encryption Experience -- BitLocker and TrueCrypt -- Summary -- Endnotes -- Chapter 6. Pod Slurping -- Attack of the Data Snatchers -- Anatomy of a Slurp -- How to Recreate the Attack -- Risky Business -- Pod Proliferation -- Advancements in This Attack -- Breaking Out of Jobs Jail -- Mitigating Measures -- Put Your Clients on a Data Diet -- Hijacking an iPhone -- Summary -- Endnotes -- Chapter 7. Social Engineering and USB Come Together for a Brutal Attack -- Brain Games -- Hacking the Wetware -- Reverse Social Engineering -- Penetration of a Vulnerable Kind -- Elevated Hazards -- Legitimate Social Engineering Concerns -- Generations of Influences -- USB Multipass -- Thwarting These Behaviors -- Security A.
الاستعراض: Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 A52 2010 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010000146325
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 A52 2010 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000146324

Includes index.

Chapter 1. USB Hacksaw -- Sharing Away Your Future -- Anatomy of the Attack -- Universal Serial Bus -- U3 and Flash Drive CD-ROM Emulation -- Inside the Hacksaw Attack -- Hacksaw Removal -- What Is the Big Deal? -- Regulators, Mount Up -- Evolution of the Portable Platform -- Portable Platforms -- Hacksaw Development -- Defending against This Attack -- Summary -- Endnotes -- Chapter 2. USB Switchblade -- Passing Grades -- Inside the Switchblade -- Switchblade Tool Summaries -- Switchblade Assembly -- Why Should I Care? -- Evolving Aspects -- Privilege Elevation -- Defensive Techniques -- System Execution Prevention and USB Antidote -- Biometrics and Token Security -- Password Protection Practices -- Windows Group Policy Options -- Browser Settings and Screen Savers -- Summary -- Chapter 3. USB-Based Virus/Malicious Code Launch -- Invasive Species among Us -- An Uncomfortable Presentation -- Anatomy of the Attack -- Malicious Code Methodologies -- Autorun -- How to Recreate the Attack -- Evolution of the Attack -- Why All the Fuss? -- Botnets -- Distributed Denial-of-Service Attacks -- E-mail Spamming -- Infecting New Hosts -- Identity Theft -- Transporting Illegal Software -- Google AdSense and Advertisement Add-On Abuse -- Defending against This Attack -- Antimalware -- Summary -- Endnotes -- Chapter 4. USB Device Overflow -- Overflow Overview -- Analyzing This Attack -- Device Drivers -- Going with the Overflow -- USB Development and the Hole in the Heap -- Ever-Present Exposures -- Overflow Outlook -- Defensive Strategies -- Drivers -- Physical Protection Mechanisms -- Summary -- Endnote -- Chapter 5. RAM dump -- Gadgets Gone Astray -- Digital Forensic Acquisition Examination -- Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics? -- Memory Gatherings -- Reconstructing the Attack -- Mind Your Memory -- Advancements in Memory Analysis -- ManTech DD -- Additional Analysis Tools -- Future Memories -- The Room with an Evil View -- Hindering the Gatherers -- Security Framework, Programs, and Governance -- Trackers and Remote Management -- BIOS Features -- Trustless Execution Technology and Module Platform -- Enhancing the Encryption Experience -- BitLocker and TrueCrypt -- Summary -- Endnotes -- Chapter 6. Pod Slurping -- Attack of the Data Snatchers -- Anatomy of a Slurp -- How to Recreate the Attack -- Risky Business -- Pod Proliferation -- Advancements in This Attack -- Breaking Out of Jobs Jail -- Mitigating Measures -- Put Your Clients on a Data Diet -- Hijacking an iPhone -- Summary -- Endnotes -- Chapter 7. Social Engineering and USB Come Together for a Brutal Attack -- Brain Games -- Hacking the Wetware -- Reverse Social Engineering -- Penetration of a Vulnerable Kind -- Elevated Hazards -- Legitimate Social Engineering Concerns -- Generations of Influences -- USB Multipass -- Thwarting These Behaviors -- Security A.

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة