The Grizzly Steppe Report (Unmasking the Russian Cyber Activity)

The Grizzly Steppe Report (Unmasking the Russian Cyber Activity)
Автор книги: id книги: 1970677     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 27,67 руб.     (0,3$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Математика Правообладатель и/или издательство: Bookwire Дата добавления в каталог КнигаЛит: ISBN: 9788027221455 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

This analysis report provides information and gives insight into the activities of the Russian civilian and military intelligence Services (RIS) conducted during the 2016 U.S. presidential election campaign. The Grizzly Steppe Report provides details regarding the tools and hacking techniques used by the Russian hackers in order to interfere the 2016 U.S. elections. This activity by RIS is just part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This report provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.

Оглавление

Federal Bureau of Investigation. The Grizzly Steppe Report (Unmasking the Russian Cyber Activity)

The Grizzly Steppe Report (Unmasking the Russian Cyber Activity)

Reading suggestions

Summary

Description

Technical Details

Injection Flaws

Cross-site scripting (XSS) vulnerabilities

How and why are they used by malicious adversaries?

Delivery Tactics

Server vulnerabilities

Recommended Mitigations

Detailed Mitigation Strategies

Contact Information

Feedback

Отрывок из книги

U.S. Department of Homeland Security, Federal Bureau of Investigation

Summary

.....

Cross-site scripting (XSS) vulnerabilities

Server vulnerabilities

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу The Grizzly Steppe Report (Unmasking the Russian Cyber Activity)
Подняться наверх