How to Defeat Advanced Malware: New Tools for Protection and Forensics
()
About this ebook
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.
This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.
How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.
- Learn the basics of protecting your company's online-accessible assets
- Discover strategies that take advantage of micro-virtualization and BYOD
- Become adept at comparing and utilizing different endpoint security products and strategies
Henry Dalziel
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).
Read more from Henry Dalziel
How to Define and Build an Effective Cyber Threat Intelligence Capability Rating: 4 out of 5 stars4/5Automated Security Analysis of Android and iOS Applications with Mobile Security Framework Rating: 1 out of 5 stars1/5Introduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5Essential Skills for Hackers Rating: 3 out of 5 stars3/5Meeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsNext Generation Red Teaming Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Cyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5Cyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5Securing Social Media in the Enterprise Rating: 0 out of 5 stars0 ratingsHow to Attack and Defend Your Website Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Accountants and CPAs Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsDeploying Secure Containers for Training and Development Rating: 0 out of 5 stars0 ratings
Related to How to Defeat Advanced Malware
Related ebooks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Next Generation Red Teaming Rating: 0 out of 5 stars0 ratingsMastering Python Forensics Rating: 4 out of 5 stars4/5Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware Rating: 0 out of 5 stars0 ratingsLearning Penetration Testing with Python Rating: 0 out of 5 stars0 ratingsPython Passive Network Mapping: P2NMAP Rating: 4 out of 5 stars4/5Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Rating: 5 out of 5 stars5/5Learning iOS Penetration Testing Rating: 0 out of 5 stars0 ratingsSeven Deadliest Web Application Attacks Rating: 0 out of 5 stars0 ratingsComputer Forensics: A Pocket Guide Rating: 4 out of 5 stars4/5Thor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsApplication Security Program Handbook Rating: 0 out of 5 stars0 ratingsNetwork Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsSecurity Operations Center - Analyst Guide: SIEM Technology, Use Cases and Practices Rating: 4 out of 5 stars4/5Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab Rating: 4 out of 5 stars4/5Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsNetwork Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response Rating: 4 out of 5 stars4/5Building an Intelligence-Led Security Program Rating: 5 out of 5 stars5/5Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response Rating: 4 out of 5 stars4/5Penetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsMalware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides Rating: 4 out of 5 stars4/5Malware Forensics: Investigating and Analyzing Malicious Code Rating: 5 out of 5 stars5/5Cuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsWindows Malware Analysis Essentials Rating: 5 out of 5 stars5/5OS X Incident Response: Scripting and Analysis Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Podcasting For Dummies Rating: 4 out of 5 stars4/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Designer's Web Handbook: What You Need to Know to Create for the Web Rating: 0 out of 5 stars0 ratingsThe $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Coding For Dummies Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5Surveillance and Surveillance Detection: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratings200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsThe Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Six Figure Blogging In 3 Months Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5Wordpress for Beginners: The Easy Step-by-Step Guide to Creating a Website with WordPress Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5
Reviews for How to Defeat Advanced Malware
0 ratings0 reviews
Book preview
How to Defeat Advanced Malware - Henry Dalziel
How to Defeat Advanced Malware
New Tools for Protection and Forensics
Henry Dalziel
Table of Contents
Cover
Title page
Copyright
Author Biography
Contributing Editor Biography
Chapter 1: A Primer on Detection for Security
Abstract
1.1. Today’s approach: compromise-first detection
Chapter 2: 2014 Endpoint Exploitation Trends
Abstract
2.1. Zero-day trends
2.2. Notable zero-day exploitation techniques
2.3. Emerging zero-day exploitation techniques
Chapter 3: The Proposed Solution
Abstract
3.1. The principle of least privilege
3.2. Detection’s folly
Chapter 4: Protection’s Weak Link
Abstract
4.1. Desktop virtualization does not secure the endpoint
4.2. Detection and isolation using VMs
Chapter 5: Micro-Virtualization
Abstract
5.1. Related work
5.2. A practical example
5.3. Hardware-enforced task isolation
5.4. Hardware virtualization technology
5.5. Micro-virtualization at work
5.6. The microvisor
5.7. Memory and CPU isolation
5.8. Virtualized file system (VFS)
5.9. Virtualized IP networking – the mobile SDN
5.10. Virtualized desktop services
5.11. Creation and management of micro-VMs
5.12. Reducing the attack surface
Chapter 6: Advanced Forensics and Analysis
Abstract
6.1. Micro-VM behavioral analysis
6.2. Advanced live forensics
6.3. LAVA architecture
6.4. Conclusion
Copyright
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright © 2015 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library.
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress.
ISBN: 978-0-12-802731-8
For information on all Syngress publications visit our website at http://store.elsevier.com/
Author Biography
Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger, and e-book author. He writes for the blog "Concise-Courses.com" and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content (books and courses) for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment’s (UKTI) Global Entrepreneur Programme (GEP).
Contributing Editor Biography
Simon Crosby is cofounder and CTO at Bromium and The