Book description
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.
Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.
- Learn how ransomware enters your system and encrypts your files
- Understand why ransomware use has grown, especially in recent years
- Examine the organizations behind ransomware and the victims they target
- Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
- Understand how ransom is paid—and the pros and cons of paying
- Use methods to protect your organization’s workstations and servers
Publisher resources
Table of contents
- Preface
- I. Understanding Ransomware
- 1. Introduction to Ransomware
- 2. Pros and Cons of Paying the Ransom
- 3. Ransomware Operators and Targets
- II. Defensive Tactics
- 4. Protecting Workstations and Servers
- 5. Protecting the Workforce
- 6. Threat Intelligence and Ransomware
- III. Ransomware Families
- 7. Cerber
- 8. Locky
- 9. CryptXXX
- 10. Other Ransomware Families
- Index
Product information
- Title: Ransomware
- Author(s):
- Release date: November 2016
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491967881
You might also like
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …
book
Learn Kali Linux 2019
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing …
book
Learning Malware Analysis
Understand malware analysis and its practical implementation About This Book Explore the key concepts of malware …