Ransomware
Defending Against Digital Extortion
Paperback Engels 2016 1e druk 9781491967881Samenvatting
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.
Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.
- Learn how ransomware enters your system and encrypts your files
- Understand why ransomware use has grown, especially in recent years
- Examine the organizations behind ransomware and the victims they target
- Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
- Understand how ransom is paid—and the pros and cons of paying
- Use methods to protect your organization’s workstations and servers
Specificaties
Lezersrecensies
Inhoudsopgave
Part 1: Understanding Ransomware
1. Introduction to Ransomware
-Ransomware’s Checkered Past
-Anatomy of a Ransomware Attack
-Destruction Phase
-The Rapid Growth of Ransomware
-Summary
2. Pros and Cons of Paying the Ransom
-“Oh”
-When to Pay the Ransom
-Ransomware and Reporting Requirements
-Summary
3. Ransomware Operators and Targets
-Criminal Organizations
-Who Are Ransomware Groups Targeting?
-Ransomware as a Service (RaaS)
-Summary
Part 2: Defensive Tactics
4. Protecting Workstations and Servers
-Attack Vectors for Ransomware
-Hardening the System and Restricting Access
-Protecting Public-Facing Servers
-Alerting and Reacting Quickly
-Honeyfiles and Honeydirectories
-Summary
5. Protecting the Workforce
-Knowing the Risks and Targets
-Learning How to Prevent Compromises
-Testing and Teaching Users
-Post Ransomware
-Summary
6. Threat Intelligence and Ransomware
-Understanding the Latest Delivery Methods
-Using the Latest Network Indicators
-Detecting the Latest Behavioral Indicators
-Summary
Part 3: Ransomware Families
7. Cerber
-Who Developed Cerber?
-The Encryption Process
-Protecting Against Cerber
-Summary
8. Locky
-Who Developed Locky?
-The Encryption Process
-Protecting Against Locky
-Summary
9. CryptXXX
-Who Developed CryptXXX?
-The Encryption Process
-Protecting Against CryptXXX
-Summary
10. Other Ransomware Families
-CryptoWall
-PowerWare
-Ransom32
-KeRanger/KeyRanger
-Hidden Tear
-TeslaCrypt
-Mobile Ransomware
-Ransomware Targeting Medical Devices
-Summary
Index
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan