Book contents
- Frontmatter
- Contents
- Foreword
- Preface
- 1 Introduction
- 2 Background
- Part I Understanding the Behavior of Malicious Hackers
- Part II Predicting Imminent Cyber-Threats
- 6 Identifying Exploits in theWild Proactively
- 7 Predicting Enterprise-Targeted External Cyber-attacks
- 8 Bringing Social Network Analysis to Aid in Cyber-attack Prediction
- 9 Finding At-Risk Systems without Software Vulnerability Identifiers (CVEs)
- 10 Final Considerations
- References
- Index
7 - Predicting Enterprise-Targeted External Cyber-attacks
from Part II - Predicting Imminent Cyber-Threats
Published online by Cambridge University Press: 09 April 2021
- Frontmatter
- Contents
- Foreword
- Preface
- 1 Introduction
- 2 Background
- Part I Understanding the Behavior of Malicious Hackers
- Part II Predicting Imminent Cyber-Threats
- 6 Identifying Exploits in theWild Proactively
- 7 Predicting Enterprise-Targeted External Cyber-attacks
- 8 Bringing Social Network Analysis to Aid in Cyber-attack Prediction
- 9 Finding At-Risk Systems without Software Vulnerability Identifiers (CVEs)
- 10 Final Considerations
- References
- Index
Summary
- Type
- Chapter
- Information
- Exploring Malicious Hacker CommunitiesToward Proactive Cyber-Defense, pp. 108 - 126Publisher: Cambridge University PressPrint publication year: 2021