Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Ransomware Revealed
A Beginner¿s Guide to Protecting and Recovering from Ransomware Attacks
Taschenbuch von Nihad A. Hassan
Sprache: Englisch

48,14 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Aktuell nicht verfügbar

Kategorien:
Beschreibung
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly.
Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today¿the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future.

Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems.

What You Will Learn
Be aware of how ransomware infects your system

Comprehend ransomware components in simple terms

Recognize the different types of ransomware families
Identify the attack vectors employed by ransomware to infect computer systems
Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies)

Know what to do if a successful ransomware infection takes place

Understand how to pay the ransom as well as the pros and cons of paying

Set up a ransomware response plan to recover from such attacks

Who This Book Is For

Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly.
Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today¿the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future.

Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems.

What You Will Learn
Be aware of how ransomware infects your system

Comprehend ransomware components in simple terms

Recognize the different types of ransomware families
Identify the attack vectors employed by ransomware to infect computer systems
Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies)

Know what to do if a successful ransomware infection takes place

Understand how to pay the ransom as well as the pros and cons of paying

Set up a ransomware response plan to recover from such attacks

Who This Book Is For

Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.
Über den Autor
Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research in different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed several technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber open source intelligence (OSINT).
Nihad has authored five books and scores of information security articles for various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog at [...] and recently launched a dedicatedsite for open source intelligence resources at OSINT.link.
Nihad has a BS honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter (@DarknessGate), and you can connect to him via LinkedIn at darknessgate.
Zusammenfassung

Teaches you how to mitigate and respond to ransomware infection with easy-to-follow technical tips and countermeasures

Covers all angles of ransomware attacks, providing comprehensive coverage of ransomware infection vectors with detailed examples

Features techniques and advice applicable to any operating system/device type

Inhaltsverzeichnis

Part 1: Introduction to Ransomware Threats.- Chapter 1: Ransomware Overview .- Chapter 2: Ransomware Distribution Methods.- Chapter 3: Ransomware Families.- Part 2: Ransomware Mitigation Strategies.- Chapter 4: Endpoint Defense Strategies.- Chapter 5: Enterprise Defense Strategies against Ransomware Attacks.- Chapter 6: Security Awareness Training.- Part 3: Dealing with Ransomware Incidents.- Chapter 7: Paying the Ransom.- Chapter 8: Ransomware Decryption Tools.- Chapter 9: Responding to Ransomware Attacks.-

Details
Erscheinungsjahr: 2019
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xx
218 S.
78 s/w Illustr.
218 p. 78 illus.
ISBN-13: 9781484242544
ISBN-10: 1484242548
Sprache: Englisch
Herstellernummer: 978-1-4842-4254-4
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Hassan, Nihad A.
Auflage: 1st ed.
Hersteller: Apress
Apress L.P.
Maße: 254 x 178 x 14 mm
Von/Mit: Nihad A. Hassan
Erscheinungsdatum: 07.11.2019
Gewicht: 0,46 kg
Artikel-ID: 117499623
Über den Autor
Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research in different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed several technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber open source intelligence (OSINT).
Nihad has authored five books and scores of information security articles for various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog at [...] and recently launched a dedicatedsite for open source intelligence resources at OSINT.link.
Nihad has a BS honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter (@DarknessGate), and you can connect to him via LinkedIn at darknessgate.
Zusammenfassung

Teaches you how to mitigate and respond to ransomware infection with easy-to-follow technical tips and countermeasures

Covers all angles of ransomware attacks, providing comprehensive coverage of ransomware infection vectors with detailed examples

Features techniques and advice applicable to any operating system/device type

Inhaltsverzeichnis

Part 1: Introduction to Ransomware Threats.- Chapter 1: Ransomware Overview .- Chapter 2: Ransomware Distribution Methods.- Chapter 3: Ransomware Families.- Part 2: Ransomware Mitigation Strategies.- Chapter 4: Endpoint Defense Strategies.- Chapter 5: Enterprise Defense Strategies against Ransomware Attacks.- Chapter 6: Security Awareness Training.- Part 3: Dealing with Ransomware Incidents.- Chapter 7: Paying the Ransom.- Chapter 8: Ransomware Decryption Tools.- Chapter 9: Responding to Ransomware Attacks.-

Details
Erscheinungsjahr: 2019
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xx
218 S.
78 s/w Illustr.
218 p. 78 illus.
ISBN-13: 9781484242544
ISBN-10: 1484242548
Sprache: Englisch
Herstellernummer: 978-1-4842-4254-4
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Hassan, Nihad A.
Auflage: 1st ed.
Hersteller: Apress
Apress L.P.
Maße: 254 x 178 x 14 mm
Von/Mit: Nihad A. Hassan
Erscheinungsdatum: 07.11.2019
Gewicht: 0,46 kg
Artikel-ID: 117499623
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte