Written by Ben McCarty, technically reviewed by Ari Schloss and with a foreword by Malek Ben Salem, this is a thoroughly revised and polished book that uses the concept of ninjas to take the reader through the variety of different areas that you need to be aware of when it comes to cybersecurity. Using relatively recent translations of Ninja scrolls, information that for most of history has been kept hidden, ‘Cyberjutsu’ contains theories of how ninjas were so successful at being the elusive and deadly characters we know, and how this analogy can be used to allow the reader, “think like a hacker”, gain perspective and use a variety of different methods to improve and protect their programs, software or personal details from attack.
Although the intended audience for this book is security professionals, I found that the language used throughout and the use of the ninja analogies helped to translate concepts into scenarios I could visualise. With an easy to follow layout which is explained in the opening pages, this book takes you through teachings and philosophies from 400 year old ninja scrolls before going on to explain how these teaching can be connected to cyber security and finally what you can do to keep your organisation safe as well as a checklist of recommended security settings.
An interesting book full of useful information and recommendations that would be beneficial for anyone who has information online.
Cyberjutsu brings the tactics, techniques, and procedures ninjas used in feudal Japan into today's cyber security battlefield, creating an essential handbook for cyber defenders. The book uses authentic Japanese scrolls to analyze how real ninjas thought about and practiced information assurance, security, infiltration, and espionage that often required covert, unauthorised access to heavily fortified organizationsmany of the same concepts cyber security professionals deal with every day. Readers learn: how to map a network like an adversary; how to place network sensors like a ninja; how ninja used social engineering techniques to slip into castles and how ninja installed backdoors and implants into castles; anti-attribution tactics used by ninja to protect their employer and punish the enemy; ninja command and control communication (C2) techniques and much more!