Cargando…

Ransomware revealed : a beginner's guide to protecting and recovering from ransomware attacks /

Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues re...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hassan, Nihad A. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York] : Apress, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1127393829
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 191113s2019 nyua ob 000 0 eng d
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d EBLCP  |d YDX  |d TEFOD  |d UKMGB  |d OCLCF  |d N$T  |d ESU  |d SNK  |d LQU  |d UPM  |d SFB  |d UMI  |d OCLCQ  |d K6U  |d UKAHL  |d OCLCQ  |d OCLCO  |d NLW  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB9J0518  |2 bnb 
016 7 |a 019607917  |2 Uk 
019 |a 1127244122  |a 1129211211  |a 1138950128 
020 |a 9781484242551  |q (electronic bk.) 
020 |a 1484242556  |q (electronic bk.) 
020 |z 9781484242544 
020 |z 1484242548 
024 7 |a 10.1007/978-1-4842-4255-1  |2 doi 
024 8 |a 10.1007/978-1-4842-4 
029 1 |a AU@  |b 000066251057 
029 1 |a AU@  |b 000066257609 
029 1 |a AU@  |b 000066277561 
029 1 |a AU@  |b 000067074609 
029 1 |a AU@  |b 000067501804 
029 1 |a AU@  |b 000067556116 
029 1 |a UKMGB  |b 019607917 
035 |a (OCoLC)1127393829  |z (OCoLC)1127244122  |z (OCoLC)1129211211  |z (OCoLC)1138950128 
037 |a 644ADA96-2F8E-494E-92E1-13A4672D86FC  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.76.C68  |b H37 2019eb 
082 0 4 |a 005.8/8  |2 23 
049 |a UAMI 
100 1 |a Hassan, Nihad A.,  |e author. 
245 1 0 |a Ransomware revealed :  |b a beginner's guide to protecting and recovering from ransomware attacks /  |c by Nihad A. Hassan. 
264 1 |a [New York] :  |b Apress,  |c 2019. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title details screen (SpringerLink, viewed November 13, 2019). 
505 0 |a Part 1: Introduction to Ransomware Threats -- Chapter 1: Ransomware Overview -- Chapter 2: Ransomware Distribution Methods -- Chapter 3: Ransomware Families -- Part 2: Ransomware Mitigation Strategies -- Chapter 4: Endpoint Defense Strategies -- Chapter 5: Enterprise Defense Strategies against Ransomware Attacks -- Chapter 6: Security Awareness Training -- Part 3: Dealing with Ransomware Incidents -- Chapter 7: Paying the Ransom -- Chapter 8: Ransomware Decryption Tools -- Chapter 9: Responding to Ransomware Attacks.- 
520 |a Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today-the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. You will: Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks. 
504 |a Includes bibliographical references. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Malware (Computer software) 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 2 |a Computer Security 
650 6 |a Logiciels malveillants. 
650 6 |a Sécurité informatique. 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
776 0 8 |i Print version:  |z 1484242548  |z 9781484242544  |w (OCoLC)1122463017 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484242551/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36986037 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5974948 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5974910 
938 |a EBSCOhost  |b EBSC  |n 2291550 
938 |a YBP Library Services  |b YANK  |n 300942864 
994 |a 92  |b IZTAP