• Complain

Ben McCarty - Cyberjutsu: Cybersecurity for the Modern Ninja

Here you can read online Ben McCarty - Cyberjutsu: Cybersecurity for the Modern Ninja full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: No Starch Press, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ben McCarty Cyberjutsu: Cybersecurity for the Modern Ninja
  • Book:
    Cyberjutsu: Cybersecurity for the Modern Ninja
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cyberjutsu: Cybersecurity for the Modern Ninja: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cyberjutsu: Cybersecurity for the Modern Ninja" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Like Sun Tzus Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japans most notorious covert agentshistorys first advanced persistent threat (APT)into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more. Each chapter examines one TTP in detaillike assessing gaps in a targets defense, striking where the enemy is negligent, and mastering the art of invisibilityand explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a Castle Theory Thought Exercise that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). Youll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the ninja ladder, to prevent attacks. Topics also include: Threat modeling, threat intelligence, and targeted controls Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols Profiles of insider threats, and ways to recognize them in employees Covert communication TTPs and their implications for malware command and control (C2) Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits In this book, youll see the astonishing power of ninja information-gathering processesand how adopting them just might be the key to innovating contemporary cybersecurity models.

Ben McCarty: author's other books


Who wrote Cyberjutsu: Cybersecurity for the Modern Ninja? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cyberjutsu: Cybersecurity for the Modern Ninja — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cyberjutsu: Cybersecurity for the Modern Ninja" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cyberjutsu Cybersecurity for the Modern Ninja - image 1
Cyberjutsu
Cybersecurity for the Modern Ninja

by Ben McCarty

Cyberjutsu Cybersecurity for the Modern Ninja - image 2

San Francisco

CYBERJUTSU. Copyright 2021 by Ben McCarty .

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

ISBN-13: 978-1-7185-0054-9 (print)
ISBN-13: 978-1-7185-0055-6 (ebook)

Publisher: William Pollock
Executive Editor: Barbara Yien
Production Editor: Rachel Monaghan
Developmental Editors: Nic Albert and Athabasca Witschi
Project Editor: Dapinder Dosanjh
Cover Design: Octopod Studios
Cover Illustrator: Rick Reese
Technical Reviewer: Ari Schloss
Copyeditor: Paula L. Fleming
Interior Design and Composition: Maureen Forys, Happenstance Type-O-Rama
Proofreader: Holly Bauer Forsyth
Indexer: Beth Nauman-Montana

For information on book distributors or translations, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 1-415-863-9900; info@nostarch.com
www.nostarch.com

Library of Congress Cataloging-in-Publication Data

Names: McCarty, Ben, author.
Title: Cyberjutsu : cybersecurity for the modern ninja / Ben McCarty.
Description: San Francisco, CA : No Starch Press, [2021] | Includes
bibliographical references and index. | Summary: Teaches ancient
approaches to modern information security issues based on authentic,
formerly classified ninja scrolls-- Provided by publisher.
Identifiers: LCCN 2020052832 (print) | LCCN 2020052833 (ebook) | ISBN
9781718500549 (print) | ISBN 9781718500556 (ebook)
Subjects: LCSH: Computer security. | Computer networks--Security measures.
| Computer crimes--Prevention. | Ninjutsu.
Classification: LCC QA76.9.A25 M4249 2021 (print) | LCC QA76.9.A25
(ebook) | DDC 005.8--dc23
LC record available at https://lccn.loc.gov/2020052832
LC ebook record available at https://lccn.loc.gov/2020052833

No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.

The information in this book is distributed on an As Is basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.

To my lovely Sarah
and to those helpless organizations
afraid of new ideas
and blind to their own weaknesses
for motivating me to write this book

About the Author

Ben McCarty is an ex-NSA developer and US Army veteran. He is one of the first fully qualified Cyber Warfare Specialists (35Q) to serve in the Army Network Warfare Battalion. During his career, he has worked as a hacker, incident handler, threat hunter, malware analyst, network security engineer, compliance auditor, threat intelligence professional, and capability developer. He holds multiple security patents and certifications. He is currently a quantum security researcher in the Washington, DC, area.

About the Technical Reviewer

Ari Schloss started his cybersecurity career with the federal government at the IRS and has contracted with DHS and CMS (Medicare). He has experience in NIST 800-53/800-171 compliance, cybersecurity defense operations, and forensics. He has a masters degree in Information Assurance and an MBA. He currently serves as a security engineer at a defense contractor in Maryland.

Foreword

Cybersecurity has never been this critical to our economic prosperity and social peace. The need to protect our businesses intellectual property and peoples personal information is of utmost importance. Cybercriminals are getting faster, more creative, more organized, and more resourceful. Cybersecurity practitioners find themselves constantly discovering new threats and responding to new attacks, despite all the cyberdefense measures they have already taken. Its a cyber arms race.

In the 200 or so pages that follow, Benjamin McCarty, a brilliant cyber threat intelligence expert and an innovative security researcher whom I have known since 2017, shares how to protect your information from cyberhackers. Bens main message is simple: think like a ninja. But what about this message justifies writing an entire book? For the full and thorough answer, you just have to read it. But I can tell you that, at a high level, the answer lies in the tactics and techniques that ninjas use to wage warfare.

When I was in graduate school 15 years ago, the first security lesson I learned in my security engineering class was to think like a hacker. Within the cybersecurity community, we have been touting this message for several years, if not decades. But judging by the number of cyberattacks that organizations continue to undergo every year, this message does not seem to have sunk in for a large number of cyberdefenders. This is understandable for two reasons. First, the message is hard to internalize because of the lack of details. And second, any details available may be very hard to grasp. Ben addresses both issues by changing the message from Think like a hacker to Think like a ninja.

How? you might ask. Well, the answer lies in the ninja scrolls, which were scripted in medieval times but carefully kept secret until the mid-20th century. The scrolls were recently translated from Japanese to English. The translation reveals just how ninjas were trained to think, strategize, and act. Ninjas, being covert agents, cautiously kept their strategies and tactics secret. But the revelations made through the publication of their scrolls are worth a deep analysis to understand what made ninjas so successful in their espionage, deception, and surprise attack missions over centuries.

Bens analysis of these scrolls gleans the strategies, tactics, and techniques that ninjas used to conduct their attacks. He maps these ancient tactics and techniques to the modern-day tactics, techniques, and procedures (TTPs) used by hackers to conduct cyberattacks. Reading through the playbook and procedures will help security professionals understand not only how a ninja thinks, but also how a cybercriminal thinks. With that understanding, you will be able to develop the craft of really thinking like a hacker and internalizing that security principle. Not only will that help you predict the hackers potential next move, but it will also give you time to prepare for that move and build up your defenses to prevent the hacker from reaching their goal.

Another reason why Bens use of the ninja scrolls to bring these TTPs closer to cyberdefenders is a very smart approach is because these scrolls deal with attacks in the physical world; that is, they reference physical objects and describe movements within a physical environment. Physical environments are much easier for our brains to visualize than cyber or virtual environments. Thinking about the hackers tactics and techniques as they relate to tangible assets makes them more discernible. You can start envisaging how a hacker might apply a particular TTP to compromise one asset or move from one asset to another. In each chapter, Ben brilliantly takes you through a castle theory thought exercise to help you visualize those movements in a medieval castle and then translate them to a cyber environment.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cyberjutsu: Cybersecurity for the Modern Ninja»

Look at similar books to Cyberjutsu: Cybersecurity for the Modern Ninja. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cyberjutsu: Cybersecurity for the Modern Ninja»

Discussion, reviews of the book Cyberjutsu: Cybersecurity for the Modern Ninja and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.