Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

PREVENTING DIGITAL EXTORTION
Título:
PREVENTING DIGITAL EXTORTION
Subtítulo:
Autor:
THAKKAR, D
Editorial:
PACKT
Año de edición:
2017
Materia
SEGURIDAD Y CRIPTOGRAFIA
ISBN:
978-1-78712-036-5
Páginas:
360
34,95 €

 

Sinopsis

Book Description

More and more cyber threats keep emerging every day, affecting organizations across the board, targeting the entire spectrum of the Internet. Digital--or cyber--extortion so far has come across as the most serious of such threats as it seeks to profit from criminal activity, akin to blackmail. Such extortion has been rising exponentially in the digital age and has become a huge illegal money-making business, affecting users and organizations ranging from small businesses to large enterprises.

This is an insightful study spelling out in detail the ways and means employed by cyber criminals in targeting various devices and the multiple dangers such malicious activity embodies.

Here will be found an overview of methods employed to impact and infect computers, smartphones, servers, and the IoT for cyber extortion. Then, it will move on to specific subjects in more detail, covering attacks such as DDoS-based extortion, cryptoviruses, and ransomware. You will learn how to prevent such attacks and eliminate them if you are compromised. This book will help you become a pro at securing your data and preventing your organization from paying a hefty ransom.

Table of Contents

1: INTRODUCTION TO CYBER EXTORTION
2: DDOS EXTORTION
3: AVOIDING DATA THEFT EXTORTION
4: MITIGATING LOCKER RANSOMWARE
5: CRYPTO RANSOMWARE PREVENTION TECHNIQUES
6: EXPLORING MOBILE EXTORTIONS
7: FOLLOW THE MONEY
8: HELD HOSTAGE - WHAT NOW?
9: EXTORTION OF THE FUTURE
What You Will Learn

Delve into the various types, stages, and economics of digital extortion
Understand the science behind different attacks
Understand the gravity of and mechanics behind ransomware and prevent and mitigate data breaches and financial losses
Use effective tools to defend against ransomware
Analyze attacks, the money flow, and cyber insurance processes
Learn the art of preventing digital extortion and securing confidential data
Get an idea of the future of extortion tactics and how technological advances will affect their development