did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781597495530

Seven Deadliest Usb Attacks

by
  • ISBN13:

    9781597495530

  • ISBN10:

    1597495530

  • Format: Paperback
  • Copyright: 2010-04-22
  • Publisher: Syngress Media Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $26.95
  • Digital
    $28.07
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Keep up with the latest hacks, attacks, and exploits affecting USB technology. The authors highlight the best ways to defend against these vicious hacks with step-by-step instruction, and deliver techniques to make one's computer and network impenetrable.

Table of Contents

About the Authorsp. ix
Introductionp. xi
USB Hacksawp. 1
Sharing Away your Futurep. 2
Anatomy of the Attackp. 5
Universal Serial Busp. 5
U3 and Flash Drive CD-ROM Emulationp. 5
Inside the Hacksaw Attackp. 6
Hacksaw Removalp. 17
What is the Big Deal?p. 17
Regulators, Mount Upp. 18
Evolution of the Portable Platformp. 20
Portable Platformsp. 20
Hacksaw Developmentp. 22
Defending against This Attackp. 23
Summaryp. 26
Endnotesp. 26
USB Switchbladep. 27
Passing Gradesp. 28
Inside the Switchbladep. 31
Switchblade Tool Summariesp. 32
Switchblade Assemblyp. 38
Why Should I Care?p. 51
Evolving Aspectsp. 52
Privilege Elevationp. 54
Defensive Techniquesp. 54
System Execution Prevention and USB Antidotep. 55
Biometrics and Token Securityp. 57
Password Protection Practicesp. 57
Windows Group Policy Optionsp. 60
Browser Settings and Screen Saversp. 61
Summaryp. 63
USB-Based Virus/Malicious Code Launchp. 65
Invasive Species among Usp. 66
An Uncomfortable Presentationp. 67
Anatomy of the Attackp. 69
Malicious Code Methodologiesp. 69
Autorunp. 74
How to Recreate the Attackp. 79
Evolution of the Attackp. 85
Why all the Fuss?p. 88
Botnetsp. 88
Distributed Denial-of-Service Attacksp. 88
E-mail Spammingp. 88
Infecting New Hostsp. 89
Identity Theftp. 89
Transporting Illegal Softwarep. 89
Google AdSense and Advertisement Add-On Abusep. 89
Defending against this Attackp. 90
Antimalwarep. 92
Summaryp. 96
Endnotesp. 96
USB Device Overflowp. 97
Overflow Overviewp. 97
Analyzing this Attackp. 99
Device Driversp. 99
Going with the Overflowp. 100
USB Development and the Hole in the Heapp. 103
Ever-Present Exposuresp. 105
Overflow Outlookp. 106
Defensive Strategiesp. 107
Driversp. 107
Physical Protection Mechanismsp. 114
Summaryp. 115
Endnotep. 116
RAM dumpp. 117
Gadgets Gone Astrayp. 118
Digital Forensic Acquisition Examinationp. 118
Computer Online Forensic Evidence Extractor or Detect and Eliminate Computer-Assisted Forensics?p. 119
Memory Gatheringsp. 120
Reconstructing the Attackp. 122
Mind your Memoryp. 133
Advancements in Memory Analysisp. 136
ManTech DDp. 136
Additional Analysis Toolsp. 140
Future Memoriesp. 141
The Room with an Evil Viewp. 141
Hindering the Gatherersp. 143
Security Framework, Programs, and Governancep. 143
Trackers and Remote Managementp. 145
BIOS Featuresp. 147
Trustless Execution Technology and Module Platformp. 148
Enhancing the Encryption Experiencep. 149
BitLocker and TrueCryptp. 150
Summaryp. 151
Endnotesp. 151
Pod Slurpingp. 153
Attack of the Data Snatchersp. 154
Anatomy of a Slurpp. 155
How to Recreate the Attackp. 156
Risky Businessp. 157
Pod Proliferationp. 158
Advancements in This Attackp. 159
Breaking Out of Jobs' Jailp. 160
Mitigating Measuresp. 170
Put your Clients on a Data Dietp. 170
Hijacking an iPhonep. 173
Summaryp. 175
Endnotesp. 176
Social Engineering and USB come Together for a Brutal Attackp. 177
Brain Gamesp. 178
Hacking the Wetwarep. 179
Reverse Social Engineeringp. 179
Penetration of a Vulnerable Kindp. 180
Elevated Hazardsp. 204
Legitimate Social Engineering Concernsp. 205
Generations of Influencesp. 206
USB Multipassp. 208
Thwarting These Behaviorsp. 208
Security Awareness and Trainingp. 208
Behavioral Biometricsp. 210
Windows Enhancementsp. 211
Summaryp. 216
Overviewp. 216
Endnotesp. 217
Indexp. 219
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program