29,90 Kč
Times are changing. The era of poaching groups crawling through the landscape with weapons in hand has almost passed. It has been replaced by a time in which poachers sit in front of computer screens, attempting to infiltrate the systems of companies protecting rare animals. Their prey includes coordinates, information about the location and hiding places of tigers, rhinoceroses, and even other relatively more common animals. Against these professional poachers, not even a hundred gamekeepers with rifles can do anything. But do the animals have any hope? Is it even possible to catch and expose poachers during a cyber attack?
This short exposition woven with a story is suitable not only for those interested in defensive cybersecurity or novice programmers but also for everyone who wants to keep up with the times, learn something new, and transition from the forest environment to the virtual network environment. The old stories about poachers from over a hundred years ago necessarily need to be revived and supplemented.
Popis
Times are changing. The era of poaching groups crawling through the landscape with weapons in hand has almost passed. It has been replaced by a time in which poachers sit in front of computer screens, attempting to infiltrate the systems of companies protecting rare animals. Their prey includes coordinates, information about the location and hiding places of tigers, rhinoceroses, and even other relatively more common animals. Against these professional poachers, not even a hundred gamekeepers with rifles can do anything. But do the animals have any hope? Is it even possible to catch and expose poachers during a cyber attack?
This short exposition woven with a story is suitable not only for those interested in defensive cybersecurity or novice programmers but also for everyone who wants to keep up with the times, learn something new, and transition from the forest environment to the virtual network environment. The old stories about poachers from over a hundred years ago necessarily need to be revived and supplemented.
Table of Contents:
Chapter I: At the Scene
Chapter II: Time Windows
Chapter III: Resolution of Time Windows
Chapter IV: Preparation for the Encounter
Chapter V: Analysis of Time Windows
Chapter VI: Analysis of Behavior of Entities
Chapter VII: Security Threats and Machine Learning
Chapter VIII: The Unexpected Attack
Title: How to Deal with Cyberpoachers
Author: Přemysl Lúa Černý
Number of pages: 50 pages
Available formats: PDF, AZW3 (Kindle), EPUB, MOBI
Language: English
Issued by the author in 2024.