Cargando…

Ransomware : defending against digital extortion /

"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Liska, Allan (Autor), Gallo, Timothy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2016.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn964632283
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 161130t20162017caua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d N$T  |d YDX  |d IDEBK  |d EBLCP  |d TEFOD  |d TOH  |d STF  |d DEBBG  |d OCLCF  |d N$T  |d OCLCQ  |d OCLCA  |d COO  |d HCO  |d UOK  |d CEF  |d KSU  |d DEHBZ  |d VT2  |d OCLCQ  |d WYU  |d C6I  |d UAB  |d UKAHL  |d OCLCQ  |d OCLCO  |d HRM  |d OCLCQ  |d OCLCO 
019 |a 964526518  |a 964555374  |a 965127221 
020 |a 9781491967850  |q (electronic bk.) 
020 |a 1491967854  |q (electronic bk.) 
020 |a 9781491967836  |q (electronic bk.) 
020 |a 1491967838  |q (electronic bk.) 
020 |a 9781491967874 
020 |a 1491967870 
020 |z 9781491967881 
020 |z 1491967889 
029 1 |a AU@  |b 000059643998 
029 1 |a DEBBG  |b BV043970610 
029 1 |a DEBSZ  |b 485810859 
029 1 |a GBVCP  |b 876249608 
035 |a (OCoLC)964632283  |z (OCoLC)964526518  |z (OCoLC)964555374  |z (OCoLC)965127221 
037 |a CL0500000803  |b Safari Books Online 
037 |a F041BB76-7934-4464-8980-28CDABFD90F7  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
050 4 |a QA76.76.C68  |b L57 2017eb 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8/8  |2 23 
049 |a UAMI 
100 1 |a Liska, Allan,  |e author. 
245 1 0 |a Ransomware :  |b defending against digital extortion /  |c Allan Liska and Timothy Gallo. 
246 3 0 |a Defending against digital extortion 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2016. 
264 4 |c ©2017 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed November 29, 2016). 
500 |a Includes index. 
505 0 |a Understanding ransomware. Introduction to ransomware ; Pros and cons of paying the ransom ; Ransomware operators and targets -- Defensive tactics. Protecting workstations and servers ; Protecting the workforce ; Threat intelligence and ransomware -- Ransomware families. Cerber ; Locky ; CryptXXX ; Other ransomware families. 
505 0 |a Copyright; Table of Contents; Preface; ; Conventions Used in This Book; Using Code Examples; O'Reilly Safari; How to Contact Us; Acknowledgments; Part I. Understanding Ransomware; Chapter 1. Introduction to Ransomware; Ransomware's Checkered Past; Anatomy of a Ransomware Attack; Deployment; Installation; Command-and-Control; Destruction; Extortion; Destruction Phase; File Encryption; System or Browser Locking; The Rapid Growth of Ransomware; Other Factors; Misleading Applications, FakeAV, and Modern CrytpoRansomware; Summary; Chapter 2. Pros and Cons of Paying the Ransom; "Oh." 
505 8 |a Knowing What Is Actually Backed UpKnowing Which Ransomware Family Infected the System; When to Pay the Ransom; Ransomware and Reporting Requirements; PCI DSS and Ransomware; HIPPA; Summary; Chapter 3. Ransomware Operators and Targets; Criminal Organizations; TeslaCrypt; CryptXXX; CryptoWall; Locky; Ranscam; Who Are Ransomware Groups Targeting?; Evolving Targets; Advanced Hacking Groups Move In; Ransomware as a Service (RaaS); Different RaaS Models; RaaS Disrupts Security Tools; Summary; Part II. Defensive Tactics; Chapter 4. Protecting Workstations and Servers; Attack Vectors for Ransomware. 
505 8 |a Hardening the System and Restricting AccessTime to Ditch Flash; Asset Management, Vulnerability, Scanning, and Patching; Disrupting the Attack Chain; Looking for the Executable Post-Attack; Protecting Public-Facing Servers; Alerting and Reacting Quickly; Honeyfiles and Honeydirectories; Summary; Chapter 5. Protecting the Workforce; Knowing the Risks and Targets; Learning How to Prevent Compromises; Email Attachment Scanning; Tracking Down the Websites; Testing and Teaching Users; Security Awareness Training; Phishing Users; Post Ransomware; Summary. 
505 8 |a Chapter 6. Threat Intelligence and RansomwareUnderstanding the Latest Delivery Methods; Using the Latest Network Indicators; Detecting the Latest Behavioral Indicators; User Behavior Analytics; Summary; Part III. Ransomware Families; Chapter 7. Cerber; Who Developed Cerber?; The Encryption Process; Cerber and BITS; Protecting Against Cerber; Summary; Chapter 8. Locky; Who Developed Locky?; The Encryption Process; Understanding Locky's DGA; Zepto and Bart Variants; DLL Delivery; Protecting Against Locky; Block the Spam; Disable Macros in Microsoft Office Documents. 
505 8 |a Don't Allow JavaScript Files to Execute LocallyStop the Initial Callout; Reverse-Engineering the DGA; Summary; Chapter 9. CryptXXX; Who Developed CryptXXX?; Advanced Endpoint Protection Versus Sandboxing; Crypt + XXX; The Encryption Process; Protecting Against CryptXXX; Exploit Kits; DNS Firewalls and IDS; Stopping CryptXXX; Summary; Chapter 10. Other Ransomware Families; CryptoWall; Who Developed CryptoWall?; The Encryption Process; PowerWare; The Encryption Process; Protecting Against PowerWare; Ransom32; KeRanger/KeyRanger; Hidden Tear; TeslaCrypt; Mobile Ransomware. 
520 |a "The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place"--Back cover. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes. 
650 6 |a Sécurité informatique. 
650 6 |a Criminalité informatique. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Gallo, Timothy,  |e author. 
776 0 8 |i Print version:  |z 1491967889  |z 9781491967881  |w (OCoLC)956341019 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491967874/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32112785 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32112786 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4747219 
938 |a EBSCOhost  |b EBSC  |n 1427738 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37033145 
938 |a YBP Library Services  |b YANK  |n 13276055 
994 |a 92  |b IZTAP