ABSTRACT

From the perspective of the hacking/security chess game, this chapter stands alone in that it is the only technical chapter in this book that represents defenders truly participating in the chess game by actively pursuing attackers and investigating evidence of hacking activity. 1 Or in other words, this is the only chapter that touches upon attack-oriented “chess” strategy and related chess moves and pieces (“tools”) from both an offensive and defensive perspective.