Behaviors and Patterns of Rogue Hosting Providers
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Cyber Threat Landscape
Categories of Hosting Providers
Threat Intelligence Cycle
Threat Intel Ecosystem Focus Areas
Requirements
Our stakeholders
Collection
Umbrella Investigate Intel Production Cycle
Processing
Autonomous System Number (ASN)
Analysis
Leaf (Stub) ASN or leaf ASNs chain
Indicator: Offshore Business Registration
Anonymous Payment Methods
Helping customers to maintain operations
Sample Rogue Hosters with a Dutch footprint (April 2018)
Dissemination
Law enforcement: Cross Jurisdictional Business Model
Law enforcement: Taking Down Bad Content
Law Enforcement Recommendations
Security Community Recommendations
Policy makers: Recommendations
Hosting Community Recommendations
Summary
References
Additional Related Work
Taught by
Hack In The Box Security Conference
Related Courses
La Responsabilidad Social Corporativa: Ruta a la SostenibilidadMiríadax Effectuation : l'entrepreneuriat pour tous
EMLYON Business School via Coursera Water in a Thirsty World
Open2Study Développement Durable
École Centrale Paris via France Université Numerique Make an Impact: Sustainability for Professionals
University of Bath via FutureLearn