Index
A
Actions on Objectives phase, Intrusion Kill Chain 312
Deceive attacker activities, example controls 316
Degrade attacker activities, example controls 315
Deny attacker activities, example controls 314
Detect attacker activities, example controls 313
Disrupt attacker activities, example controls 314
Limit attacker activities, example controls 316
mitigating, controls 313
Restore attacker activities, example controls 316
Active Directory (AD) 11
Address Resolution Protocol (ARP) 109
Address Space Layout Randomization (ASLR) 144, 297
Advanced Encryption Standard (AES) 389
advanced persistent threat (APT) 9
Advanced Persistent Threat (APT) 388
Amazon Elastic Compute Cloud (Amazon EC2) 357
Amazon Web Services (AWS) 356
Americas, The
10-year regional report card 137, 140
long-term view, of threat landscape 136, 137
anti-malware solutions
significance, debate 152
Anti-Phishing Working...