With so many quality titles out there on computer security, honestly I was a bit skeptical, but this book brings in a breath of fresh air. Dan Dieterle, Cyber Arms
Unlike what most people are led to believe, the hacking problem is not just about hackers and security vulnerabilities. Get an insider’s perspective on computer security and hacking, to learn some of the hidden reasons why hackers have an advantage over their security counterparts. Can the world ever be free of hackers given today’s technology? The answer to this question may surprise you.
OWNED: Why hacking continues to be a problem provides readers with a different perspective on computer security and hacking, by intermixing both subjects and explaining how and why hackers are able break into secured networks and computers. This book is for anyone using a computer – not just computer security professionals. Information is presented in a simple and concise manner, building readers’ knowledge as they progress through the book.
Readers will learn about:
- Computer security and hacking basics
- Why hackers are so successful at breaking into computers
- The five different types of hackers
- Advanced hacker techniques
- How Trojans operate and hide on computers
- Why computer security personnel do not detect hackers
The world is facing an ever growing computer security crisis and the situation will not improve until people understand the real reasons why hacking continues to be a problem.
Price: Only $9.99 (US)
Also available on iPad (iBooks).
ISBN 978-1-4523-6220-5 / 9781452362205
TABLE OF CONTENTS
CHAPTER 1: Introduction
Companies, governments and home computer users spend billions of dollars each year on computer security, but hackers are able to break into secured computers anyway. A personal experience and some personal insights are presented, followed by a brief summary of what information is going to be covered in the book.
CHAPTER 2: The Standard Security Template
Before readers can understand how hackers think and operate, it is important that they understand how security is implemented. The theory and steps to implement basic security measures for a small office network are explained.
CHAPTER 3: Let’s talk a bit about Chapter 2
Computer security is not easy and there is a reason why it’s not easy. Four schools of knowledge need to be mastered in order to implement basic security. Additionally, an implementer needs to be qualified, have someone audit his work, and document the security implementation. An organization needs to be mindful of the three common security implementation exceptions that significantly put an organization at risk.
CHAPTER 4: Hacking 101 – An Introduction
Even a hacker needs to learn his craft and start with the basics. What is and isn’t considered hacking? What type of people are hackers? How does someone learn to hack? An overview of how hackers identify, target and attack their victims is presented, as well as the four types of techniques used to break into computers and network devices.
CHAPTER 5: Hacking 201 – Getting more technical
Want to look over the shoulder of a hacker and see how someone is hacked? An example of how a Web site is hacked to obtain personal and credit card information is explained, including the thought process and strategies for each step.
CHAPTER 6: The Hacker’s Edge
Why are hackers ahead of the security game? The answer to this question is not as straightforward as you might think. Find out who is also to blame for the hacking problem we face today. Ten revealing questions to ask a security expert are presented.
CHAPTER 7: Know Thy Enemy
There are five different types of hackers and each type has its own little quirks, deficiencies and skills. Some hacking terms are explained in more detail and advanced hacking concepts and techniques are covered.
CHAPTER 8: Advanced Recon
Two advanced hacker reconnaissance tactics that give hackers an incredible advantage over their opposing counterparts are discussed. An “IP map” is a comprehensive database of the Internet that pre-qualifies candidates for compromise once a new vulnerability is discovered. Well-crafted email delivered to someone’s desktop can be used to gather extensive information about a specific user’s behavior and an organization’s security tools and capabilities.
CHAPTER 9: Smart Trojans and Sleepers
Trojans are the most powerful weapons in a hacker’s toolkit. Different types of Trojans and how they operate are discussed, including how Trojans avoid detection and how sleeper Trojans lie in hiding, checking for the signal to fully awaken.
CHAPTER 10: Intrusion Detection – Do you see what I see?
If compromise is inevitable, then the ability to detect compromise may be even more important than the security measures. Security personnel rely heavily on security log files and alarms to identify a hacker on the network. But how does an organization detect the presence of a hacker, if the security personnel and tools do not see him?
CHAPTER 11: Final Words
A review of the five groups of people who are tied into the hacking problem, along with a rhetorical question, reinforce the reader’s new understanding of why hacking continues to be a problem. Will the world ever be free of hackers? One last thought offers a spark of hope.