Ransomware
O'Reilly Media (Verlag)
978-1-4919-6788-1 (ISBN)
- Lieferbar (Termin unbekannt)
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.
Learn how ransomware enters your system and encrypts your files
Understand why ransomware use has grown, especially in recent years
Examine the organizations behind ransomware and the victims they target
Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
Understand how ransom is paid—and the pros and cons of paying
Use methods to protect your organization’s workstations and servers
Allan Liska has more than 15 years experience in the world of cyber security. Mr Liska has worked both as a security practitioner and an ethical hacker, so he is familiar with both sides of the security aisle and, through his work at Symantec and iSIGHT Partners, has helped countless organizations improve their security posture using more effective intelligence.
Timothy Gallo has been working in IT security for the past 15 years, prior to that he's been a bouncer, a bartender, and a physicist. He loves finding new ways to do things and is working on building his very first art car for use at burning man this year.
Understanding Ransomware
Chapter 1Introduction to Ransomware
Ransomware’s Checkered Past
Anatomy of a Ransomware Attack
Destruction Phase
The Rapid Growth of Ransomware
Summary
Chapter 2Pros and Cons of Paying the Ransom
“Oh”
When to Pay the Ransom
Ransomware and Reporting Requirements
Summary
Chapter 3Ransomware Operators and Targets
Criminal Organizations
Who Are Ransomware Groups Targeting?
Ransomware as a Service (RaaS)
Summary
Defensive Tactics
Chapter 4Protecting Workstations and Servers
Attack Vectors for Ransomware
Hardening the System and Restricting Access
Protecting Public-Facing Servers
Alerting and Reacting Quickly
Honeyfiles and Honeydirectories
Summary
Chapter 5Protecting the Workforce
Knowing the Risks and Targets
Learning How to Prevent Compromises
Testing and Teaching Users
Post Ransomware
Summary
Chapter 6Threat Intelligence and Ransomware
Understanding the Latest Delivery Methods
Using the Latest Network Indicators
Detecting the Latest Behavioral Indicators
Summary
Ransomware Families
Chapter 7Cerber
Who Developed Cerber?
The Encryption Process
Protecting Against Cerber
Summary
Chapter 8Locky
Who Developed Locky?
The Encryption Process
Protecting Against Locky
Summary
Chapter 9CryptXXX
Who Developed CryptXXX?
The Encryption Process
Protecting Against CryptXXX
Summary
Chapter 10Other Ransomware Families
CryptoWall
PowerWare
Ransom32
KeRanger/KeyRanger
Hidden Tear
TeslaCrypt
Mobile Ransomware
Ransomware Targeting Medical Devices
Summary
Erscheinungsdatum | 03.12.2016 |
---|---|
Zusatzinfo | black & white illustrations |
Verlagsort | Sebastopol |
Sprache | englisch |
Maße | 180 x 234 mm |
Gewicht | 330 g |
Einbandart | kartoniert |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Erpressung • IT-Sicherheit • Malware • Netzwerksicherheit • Trojaner |
ISBN-10 | 1-4919-6788-9 / 1491967889 |
ISBN-13 | 978-1-4919-6788-1 / 9781491967881 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich