Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
By 作者: Abhijit Mohanta - Mounir Hahad - Kumaraguru Velmurugan
ISBN-10 书号: 1788620607
ISBN-13 书号: 9781788620604
Release Finelybook 出版日期: 2018-03-23
pages 页数: (265 )
The Book Description
Understand malware types and malware techniques with examples
Obtain a quick malware analysis
Understand ransomware techniques, their distribution, and their payment mechanism
Case studies of famous ransomware attacks
Discover detection technologies for complex malware and ransomware
Configure security software to protect against ransomware
Handle ransomware infections
Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization.
This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware. We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. We will then move on to how the ransom is paid and the negative effects of doing so. You will learn how to respond quickly to ransomware attacks and how to protect yourself. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators. You will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.
By the end of this book, you will have end-to-end knowledge of the trending malware in the tech industry at present.
A complete guide to how ransomware works
Build a security mechanism to prevent digital extortion.
A practical approach to knowing about, and responding to, ransomware.
1 Malware from Fun to Profit
2 Malware Analysis Fundamentals
3 Ransomware Distribution
4 Ransomware Techniques for Hijacking the System
5 Ransomware Economics
6 Case Study of Famous Ransomware
7 Other Forms of Digital Extortion
8 Ransomware Detection and Prevention
9 Incident Response
10 The Future of Ransomware