Ransomware : defending against digital extortion /
"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to s...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media,
2016.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Understanding ransomware. Introduction to ransomware ; Pros and cons of paying the ransom ; Ransomware operators and targets
- Defensive tactics. Protecting workstations and servers ; Protecting the workforce ; Threat intelligence and ransomware
- Ransomware families. Cerber ; Locky ; CryptXXX ; Other ransomware families.
- Copyright; Table of Contents; Preface; ; Conventions Used in This Book; Using Code Examples; O'Reilly Safari; How to Contact Us; Acknowledgments; Part I. Understanding Ransomware; Chapter 1. Introduction to Ransomware; Ransomware's Checkered Past; Anatomy of a Ransomware Attack; Deployment; Installation; Command-and-Control; Destruction; Extortion; Destruction Phase; File Encryption; System or Browser Locking; The Rapid Growth of Ransomware; Other Factors; Misleading Applications, FakeAV, and Modern CrytpoRansomware; Summary; Chapter 2. Pros and Cons of Paying the Ransom; "Oh."
- Knowing What Is Actually Backed UpKnowing Which Ransomware Family Infected the System; When to Pay the Ransom; Ransomware and Reporting Requirements; PCI DSS and Ransomware; HIPPA; Summary; Chapter 3. Ransomware Operators and Targets; Criminal Organizations; TeslaCrypt; CryptXXX; CryptoWall; Locky; Ranscam; Who Are Ransomware Groups Targeting?; Evolving Targets; Advanced Hacking Groups Move In; Ransomware as a Service (RaaS); Different RaaS Models; RaaS Disrupts Security Tools; Summary; Part II. Defensive Tactics; Chapter 4. Protecting Workstations and Servers; Attack Vectors for Ransomware.
- Hardening the System and Restricting AccessTime to Ditch Flash; Asset Management, Vulnerability, Scanning, and Patching; Disrupting the Attack Chain; Looking for the Executable Post-Attack; Protecting Public-Facing Servers; Alerting and Reacting Quickly; Honeyfiles and Honeydirectories; Summary; Chapter 5. Protecting the Workforce; Knowing the Risks and Targets; Learning How to Prevent Compromises; Email Attachment Scanning; Tracking Down the Websites; Testing and Teaching Users; Security Awareness Training; Phishing Users; Post Ransomware; Summary.
- Chapter 6. Threat Intelligence and RansomwareUnderstanding the Latest Delivery Methods; Using the Latest Network Indicators; Detecting the Latest Behavioral Indicators; User Behavior Analytics; Summary; Part III. Ransomware Families; Chapter 7. Cerber; Who Developed Cerber?; The Encryption Process; Cerber and BITS; Protecting Against Cerber; Summary; Chapter 8. Locky; Who Developed Locky?; The Encryption Process; Understanding Locky's DGA; Zepto and Bart Variants; DLL Delivery; Protecting Against Locky; Block the Spam; Disable Macros in Microsoft Office Documents.
- Don't Allow JavaScript Files to Execute LocallyStop the Initial Callout; Reverse-Engineering the DGA; Summary; Chapter 9. CryptXXX; Who Developed CryptXXX?; Advanced Endpoint Protection Versus Sandboxing; Crypt + XXX; The Encryption Process; Protecting Against CryptXXX; Exploit Kits; DNS Firewalls and IDS; Stopping CryptXXX; Summary; Chapter 10. Other Ransomware Families; CryptoWall; Who Developed CryptoWall?; The Encryption Process; PowerWare; The Encryption Process; Protecting Against PowerWare; Ransom32; KeRanger/KeyRanger; Hidden Tear; TeslaCrypt; Mobile Ransomware.