Cyber Adversary Characterization: Auditing the Hacker Mind

来源:互联网 发布:ppt动画制作软件 编辑:程序博客网 时间:2024/06/05 09:43
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Develop a Well-Measured Defense Against CybercriminalsWhen we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That's lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.
http://rapidshare.com/files/53702574/1931836116.zip
原创粉丝点击