
Predicting Malicious Behavior
Tools and Techniques for Ensuring Global Security
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
A groundbreaking exploration of how to identify and fight security threats at every level
This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures.
- Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the future
- Illustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing security
- Covers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats
- CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis
Predicting Malicious Behavior fuses the behavioral and computer sciences to enlighten anyone concerned with security and to aid professionals in keeping our world safer.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Part I
Understanding the Dark Side: Malicious Intent
Chapter 1
Analyzing the Malicious Individual
Analyzing the Unique Individual
- First, we need to ensure that we have adequate and multiple observations of behavior under various conditions.
- Second, observations must include adequate descriptions so that we can identify the who, what, when, where, and how of past behaviors.
Definition
Note
Note
- Richard Reid, the infamous shoe bomber
- Ted Bundy, the infamous serial killer
- The general, anonymous individual cyber attacker
Richard Reid: The Shoe Bomber
Table of contents
- Cover
- Title page
- Copyright page
- Dedication
- About the Author
- Credits
- Acknowledgements
- Foreword
- Introduction
- Part I: Understanding the Dark Side: Malicious Intent
- Part II: Dissecting Malicious Behavior
- Part III: Applying Tools and Methods
- Part IV: Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security
- Appendix
- Index
- Download CD/DVD content
- End User License Agreement