Chapter 10
Prevention
Let’s think the unthinkable, let’s do the undoable. Let us prepare to grapple with the ineffable itself, and see if we may not eff it after all.
—Douglas Adams
Learning Objectives
Identify the keys to building an effective cybersecurity program
Describe key security technologies that can prevent initial entry
Learn techniques and strategies for catching cyberattackers early, before an incident metastasizes into cyber extortion
Know how to reduce attackers’ leverage by increasing your operational resilience and decreasing the risk of data theft
Understand that cyber extortion is a systemic challenge that requires a coordinated, global response
Extortion is the end of a journey; the last phase of a cyberattack. The adversaries’ ...
Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.