Cyberjutsu: Cybersecurity for the Modern Ninja

Cyberjutsu: Cybersecurity for the Modern Ninja
PDF, ePUB

Book Description
Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.

Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan’s most notorious covert agents—history’s first advanced persistent threat (APT)—into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more.
 
Each chapter examines one TTP in detail—like assessing gaps in a target’s defense, striking where the enemy is negligent, and mastering the art of invisibility—and explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a “Castle Theory Thought Exercise” that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You’ll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the “ninja ladder,” to prevent attacks.
 
Topics also include:
    Threat modeling, threat intelligence, and targeted controls
    Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols
    Profiles of insider threats, and ways to recognize them in employees
    Covert communication TTPs and their implications for malware command and control (C2)
    Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits
 
In this book, you’ll see the astonishing power of ninja information-gathering processes—and how adopting them just might be the key to innovating contemporary cybersecurity models.

Content

CHAPTER 1: MAPPING NETWORKS
CHAPTER 2: GUARDING WITH SPECIAL CARE
CHAPTER 3: XENOPHOBIC SECURITY
CHAPTER 4: IDENTIFICATION CHALLENGE
CHAPTER 5: DOUBLE-SEALED PASSWORD
CHAPTER 6: HOURS OF INFILTRATION
CHAPTER 7: ACCESS TO TIME
CHAPTER 8: TOOLS
CHAPTER 9: SENSORS
CHAPTER 10: BRIDGES AND LADDERS
CHAPTER 11: LOCKS
CHAPTER 12: MOON ON THE WATER
CHAPTER 13: WORM AGENT
CHAPTER 14: GHOST ON THE MOON
CHAPTER 15: THE ART OF THE FIREFLIES
CHAPTER 16: LIVE CAPTURE
CHAPTER 17: FIRE ATTACK
CHAPTER 18: COVERT COMMUNICATION
CHAPTER 19: CALL SIGNS
CHAPTER 20: LIGHT, NOISE, AND LITTER DISCIPLINE
CHAPTER 21: CIRCUMSTANCES OF INFILTRATION
CHAPTER 22: ZERO-DAYS
CHAPTER 23: HIRING SHINOBI
CHAPTER 24: GUARDHOUSE BEHAVIOR
CHAPTER 25: ZERO-TRUST THREAT MANAGEMENT
CHAPTER 26: SHINOBI TRADECRAFT

Download Cyberjutsu: Cybersecurity for the Modern Ninja PDF or ePUB format free


Free sample

Download in .PDF format



Download in .ePUB format


Add comments
Прокомментировать
Введите код с картинки:*
Кликните на изображение чтобы обновить код, если он неразборчив
Copyright © 2019