Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

RANSOMWARE. DEFENDING AGAINST DIGITAL EXTORTION
Título:
RANSOMWARE. DEFENDING AGAINST DIGITAL EXTORTION
Subtítulo:
Autor:
LISKA, A
Editorial:
O´REILLY
Año de edición:
2016
ISBN:
978-1-4919-6788-1
Páginas:
190
38,50 € -10,0% 34,65 €

 

Sinopsis

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.

Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.

Learn how ransomware enters your system and encrypts your files
Understand why ransomware use has grown, especially in recent years
Examine the organizations behind ransomware and the victims they target
Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
Understand how ransom is paid-and the pros and cons of paying
Use methods to protect your organization's workstations and servers



Understanding Ransomware
Chapter 1Introduction to Ransomware
Ransomware's Checkered Past
Anatomy of a Ransomware Attack
Destruction Phase
The Rapid Growth of Ransomware
Summary
Chapter 2Pros and Cons of Paying the Ransom
"Ohö
When to Pay the Ransom
Ransomware and Reporting Requirements
Summary
Chapter 3Ransomware Operators and Targets
Criminal Organizations
Who Are Ransomware Groups Targeting?
Ransomware as a Service (RaaS)
Summary
Defensive Tactics
Chapter 4Protecting Workstations and Servers
Attack Vectors for Ransomware
Hardening the System and Restricting Access
Protecting Public-Facing Servers
Alerting and Reacting Quickly
Honeyfiles and Honeydirectories
Summary
Chapter 5Protecting the Workforce
Knowing the Risks and Targets
Learning How to Prevent Compromises
Testing and Teaching Users
Post Ransomware
Summary
Chapter 6Threat Intelligence and Ransomware
Understanding the Latest Delivery Methods
Using the Latest Network Indicators
Detecting the Latest Behavioral Indicators
Summary
Ransomware Families
Chapter 7Cerber
Who Developed Cerber?
The Encryption Process
Protecting Against Cerber
Summary
Chapter 8Locky
Who Developed Locky?
The Encryption Process
Protecting Against Locky
Summary
Chapter 9CryptXXX
Who Developed CryptXXX?
The Encryption Process
Protecting Against CryptXXX
Summary
Chapter 10Other Ransomware Families
CryptoWall
PowerWare
Ransom32
KeRanger/KeyRanger
Hidden Tear
TeslaCrypt
Mobile Ransomware
Ransomware Targeting Medical Devices
Summary