Seven Deadliest USB Attacks
By Brian Anderson and Barbara Anderson
()
About this ebook
The book consists of seven chapters that cover the following: (i) USB Hacksaw; (ii) the USB Switchblade; (iii) viruses and malicious codes; (iv) USB-based heap overflow; (v) the evolution of forensics in computer security; (vi) pod slurping; and (vii) the human element of security, including the risks, rewards, and controversy surrounding social-engineering engagements.
This book was written to target a vast audience including students, technical staff, business leaders, or anyone seeking to understand fully the removable-media risk for Windows systems. It provides the tools, tricks, and detailed instructions necessary to reconstruct and mitigate these activities while peering into the risks and future aspects surrounding the respective technologies. The attacks outlined in this book are intended for individuals with moderate Microsoft Windows proficiency.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Brian Anderson
Brian Anderson started his security career as a USMC Military Police officer. During his tour in the USMC Brian also served as an instructor for weapons marksmanship, urban combat, building entry techniques and less than lethal munitions. He also took part in the Somalia humanitarian efforts and several training engagements in the Middle East. Brian’s technical experience began when he joined EDS where he became part of a leveraged team and specialized in infrastructure problem resolution, disaster recovery and design and security. His career progression was swift carrying him through security engineering and into architecture where he earned a lead role. Brian was a key participant in many high level security projects driven by HIPAA, PCI, SOX, FIPS and other regulatory compliance which included infrastructure dependent services, multi-tenant directories, IdM, RBAC, SSO, WLAN, full disk and removable media encryption, leveraged perimeter design and strategy. He has earned multiple certifications for client, server and network technologies. Brian has written numerous viewpoint and whitepapers for current and emerging technologies and is a sought out expert on matters of security, privacy and penetration testing. Brian is an avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.
Read more from Brian Anderson
Dog Eat Doug: It's a Good Thing They're Cute Rating: 0 out of 5 stars0 ratingsThe Fraternity of the Estranged: The Fight for Homosexual Rights in England, 1891-1908 Rating: 0 out of 5 stars0 ratingsThe Credit Score Blueprint: Strategies and Secrets to Raising Your Credit Score: Strategies and Secrets to Raising Your Credit Score Rating: 0 out of 5 stars0 ratingsFord's Theatre Rating: 5 out of 5 stars5/5Fathering Together: Living a Connected Dad Life Rating: 0 out of 5 stars0 ratingsEdward Carpenter: A Victorian Rebel Fighting for Gay Rights Rating: 0 out of 5 stars0 ratingsPiercing the Veil: Poetry for the Soul Rating: 0 out of 5 stars0 ratings
Related to Seven Deadliest USB Attacks
Related ebooks
Seven Deadliest USB Attacks Rating: 0 out of 5 stars0 ratingsLow Tech Hacking: Street Smarts for Security Professionals Rating: 4 out of 5 stars4/5Wireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsStealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5Seven Deadliest Network Attacks Rating: 3 out of 5 stars3/5How to Cheat at Securing a Wireless Network Rating: 2 out of 5 stars2/5How to Cheat at Configuring Open Source Security Tools Rating: 0 out of 5 stars0 ratingsBotnets: The Killer Web Applications Rating: 5 out of 5 stars5/5Hack Proofing Your Network Rating: 0 out of 5 stars0 ratingsCisco Security Specialists Guide to PIX Firewall Rating: 5 out of 5 stars5/5Penetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5Asterisk Hacking Rating: 5 out of 5 stars5/5Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Rating: 0 out of 5 stars0 ratingsNetwork and System Security Rating: 4 out of 5 stars4/5Building Cisco Remote Access Networks Rating: 5 out of 5 stars5/5Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsCisco Security Professional's Guide to Secure Intrusion Detection Systems Rating: 0 out of 5 stars0 ratingsMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Rating: 0 out of 5 stars0 ratingsBuilding a Pentesting Lab for Wireless Networks Rating: 0 out of 5 stars0 ratingsNetwork Security: A Practical Approach Rating: 5 out of 5 stars5/5Meeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing Essentials Rating: 5 out of 5 stars5/5Seven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsWireshark Network Security Rating: 3 out of 5 stars3/5Practical Malware Prevention Rating: 0 out of 5 stars0 ratingsCEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratings
Hardware For You
iPhone For Seniors For Dummies: Updated for iPhone 12 models and iOS 14 Rating: 4 out of 5 stars4/53D Printing For Dummies Rating: 4 out of 5 stars4/5Dancing with Qubits: How quantum computing works and how it can change the world Rating: 5 out of 5 stars5/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/550 Android Hacks Rating: 5 out of 5 stars5/5Arduino Essentials Rating: 5 out of 5 stars5/5Mastering ChatGPT Rating: 0 out of 5 stars0 ratingsUpgrading and Fixing Computers Do-it-Yourself For Dummies Rating: 4 out of 5 stars4/5Build Your Own PC Do-It-Yourself For Dummies Rating: 4 out of 5 stars4/5CompTIA A+ Complete Review Guide: Exam Core 1 220-1001 and Exam Core 2 220-1002 Rating: 5 out of 5 stars5/5macOS Big Sur For Dummies Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5iPhone X Hacks, Tips and Tricks: Discover 101 Awesome Tips and Tricks for iPhone XS, XS Max and iPhone X Rating: 3 out of 5 stars3/5TI-84 Plus CE Graphing Calculator For Dummies Rating: 0 out of 5 stars0 ratingsExploring Apple iPhone: iOS 15 Edition: The Illustrated, Practical Guide to Using your iPhone Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Beginning x64 Assembly Programming: From Novice to AVX Professional Rating: 0 out of 5 stars0 ratingsiPhone 14 Pro Max User Guide for Beginners and Seniors Rating: 0 out of 5 stars0 ratingsRaspberry Pi Electronics Projects for the Evil Genius Rating: 3 out of 5 stars3/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Computer Organization and Design: The Hardware / Software Interface Rating: 4 out of 5 stars4/5Mastering Apple MacBook - MacBook Pro, MacBook Air, MacOS Ultimate User Guide Rating: 1 out of 5 stars1/5Raspberry Pi for Secret Agents - Second Edition Rating: 3 out of 5 stars3/5Chip War: The Fight for the World's Most Critical Technology Rating: 4 out of 5 stars4/5Windows 11 For Seniors For Dummies Rating: 0 out of 5 stars0 ratingsThe Geeky Kids Guide! To Building Your Own Gaming PC Rating: 3 out of 5 stars3/5
Reviews for Seven Deadliest USB Attacks
0 ratings0 reviews