Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
,

Ransomware

Defending Against Digital Extortion

Paperback Engels 2016 1e druk 9781491967881
Verwachte levertijd ongeveer 16 werkdagen

Samenvatting

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.

Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.

- Learn how ransomware enters your system and encrypts your files
- Understand why ransomware use has grown, especially in recent years
- Examine the organizations behind ransomware and the victims they target
- Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
- Understand how ransom is paid—and the pros and cons of paying
- Use methods to protect your organization’s workstations and servers

Specificaties

ISBN13:9781491967881
Taal:Engels
Bindwijze:paperback
Aantal pagina's:173
Uitgever:O'Reilly
Druk:1
Verschijningsdatum:30-11-2016
Hoofdrubriek:IT-management / ICT

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Preface

Part 1: Understanding Ransomware
1. Introduction to Ransomware
-Ransomware’s Checkered Past
-Anatomy of a Ransomware Attack
-Destruction Phase
-The Rapid Growth of Ransomware
-Summary

2. Pros and Cons of Paying the Ransom
-“Oh”
-When to Pay the Ransom
-Ransomware and Reporting Requirements
-Summary

3. Ransomware Operators and Targets
-Criminal Organizations
-Who Are Ransomware Groups Targeting?
-Ransomware as a Service (RaaS)
-Summary

Part 2: Defensive Tactics
4. Protecting Workstations and Servers
-Attack Vectors for Ransomware
-Hardening the System and Restricting Access
-Protecting Public-Facing Servers
-Alerting and Reacting Quickly
-Honeyfiles and Honeydirectories
-Summary

5. Protecting the Workforce
-Knowing the Risks and Targets
-Learning How to Prevent Compromises
-Testing and Teaching Users
-Post Ransomware
-Summary

6. Threat Intelligence and Ransomware
-Understanding the Latest Delivery Methods
-Using the Latest Network Indicators
-Detecting the Latest Behavioral Indicators
-Summary

Part 3: Ransomware Families
7. Cerber
-Who Developed Cerber?
-The Encryption Process
-Protecting Against Cerber
-Summary

8. Locky
-Who Developed Locky?
-The Encryption Process
-Protecting Against Locky
-Summary

9. CryptXXX
-Who Developed CryptXXX?
-The Encryption Process
-Protecting Against CryptXXX
-Summary

10. Other Ransomware Families
-CryptoWall
-PowerWare
-Ransom32
-KeRanger/KeyRanger
-Hidden Tear
-TeslaCrypt
-Mobile Ransomware
-Ransomware Targeting Medical Devices
-Summary

Index

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Ransomware