Muutke küpsiste eelistusi

E-raamat: Ransomware: Defending Against Digital Extortion

  • Formaat: 190 pages
  • Ilmumisaeg: 21-Nov-2016
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781491967836
  • Formaat - EPUB+DRM
  • Hind: 28,67 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 190 pages
  • Ilmumisaeg: 21-Nov-2016
  • Kirjastus: O'Reilly Media
  • Keel: eng
  • ISBN-13: 9781491967836

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.

Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.

  • Learn how ransomware enters your system and encrypts your files
  • Understand why ransomware use has grown, especially in recent years
  • Examine the organizations behind ransomware and the victims they target
  • Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
  • Understand how ransom is paid—and the pros and cons of paying
  • Use methods to protect your organization’s workstations and servers
Preface ix
Part I Understanding Ransomware
1 Introduction to Ransomware
3(20)
Ransomware's Checkered Past
3(3)
Anatomy of a Ransomware Attack
6(1)
Deployment
6(2)
Installation
8(2)
Command-and-Control
10(1)
Destruction
11(1)
Extortion
11(1)
Destruction Phase
12(1)
File Encryption
12(3)
System or Browser Locking
15(2)
The Rapid Growth of Ransomware
17(1)
Other Factors
18(1)
Misleading Applications, FakeAV, and Modern CrytpoRansomware
19(2)
Summary
21(2)
2 Pros and Cons of Paying the Ransom
23(10)
"Oh"
24(1)
Knowing What Is Actually Backed Up
24(1)
Knowing Which Ransomware Family Infected the System
25(1)
When to Pay the Ransom
26(3)
Ransomware and Reporting Requirements
29(1)
PCI DSS and Ransomware
30(1)
HIPPA
31(1)
Summary
32(1)
3 Ransomware Operators and Targets
33(18)
Criminal Organizations
35(1)
TeslaCrypt
35(1)
CryptXXX
36(1)
CryptoWall
37(1)
Locky
38(1)
Ranscam
39(1)
Who Are Ransomware Groups Targeting?
40(1)
Evolving Targets
40(1)
Advanced Hacking Groups Move In
41(2)
Ransomware as a Service (RaaS)
43(1)
Different RaaS Models
44(3)
RaaS Disrupts Security Tools
47(1)
Summary
48(3)
Part II Defensive Tactics
4 Protecting Workstations and Servers
51(24)
Attack Vectors for Ransomware
52(2)
Hardening the System and Restricting Access
54(1)
Time to Ditch Flash
55(1)
Asset Management, Vulnerability, Scanning, and Patching
55(2)
Disrupting the Attack Chain
57(11)
Looking for the Executable Post-Attack
68(1)
Protecting Public-Facing Servers
69(2)
Alerting and Reacting Quickly
71(1)
Honeyfiles and Honeydirectories
72(2)
Summary
74(1)
5 Protecting the Workforce
75(14)
Knowing the Risks and Targets
75(4)
Learning How to Prevent Compromises
79(1)
Email Attachment Scanning
79(1)
Tracking Down the Websites
80(3)
Testing and Teaching Users
83(1)
Security Awareness Training
83(1)
Phishing Users
84(2)
Post Ransomware
86(1)
Summary
87(2)
6 Threat Intelligence and Ransomware
89(12)
Understanding the Latest Delivery Methods
90(2)
Using the Latest Network Indicators
92(3)
Detecting the Latest Behavioral Indicators
95(1)
User Behavior Analytics
96(1)
Summary
97(4)
Part III Ransomware Families
7 Cerber
101(8)
Who Developed Cerber?
102(2)
The Encryption Process
104(1)
Cerber and BITS
105(1)
Protecting Against Cerber
106(2)
Summary
108(1)
8 Locky
109(18)
Who Developed Locky?
110(1)
The Encryption Process
111(2)
Understanding Locky's DGA
113(1)
Zepto and Bart Variants
113(1)
DLL Delivery
114(1)
Protecting Against Locky
115(1)
Block the Spam
115(3)
Disable Macros in Microsoft Office Documents
118(1)
Don't Allow JavaScript Files to Execute Locally
118(2)
Stop the Initial Callout
120(3)
Reverse-Engineering the DGA
123(2)
Summary
125(2)
9 CryptXXX
127(18)
Who Developed CryptXXX?
128(1)
Advanced Endpoint Protection Versus Sandboxing
128(2)
Crypt + XXX
130(2)
The Encryption Process
132(2)
Protecting Against CryptXXX
134(1)
Exploit Kits
135(1)
DNS Firewalls and IDS
136(5)
Stopping CryptXXX
141(4)
10 Other Ransomware Families
145(20)
CryptoWall
145(1)
Who Developed CryptoWall?
146(1)
The Encryption Process
147(2)
PowerWare
149(1)
The Encryption Process
150(1)
Protecting Against PowerWare
151(1)
Ransom32
152(3)
KeRanger/KeyRanger
155(2)
Hidden Tear
157(1)
TeslaCrypt
157(1)
Mobile Ransomware
158(2)
Ransomware Targeting Medical Devices
160(1)
Medical Devices
161(2)
Summary
163(2)
Index 165
Allan Liska has more than 15 years experience in the world of cyber security. Mr Liska has worked both as a security practitioner and an ethical hacker, so he is familiar with both sides of the security aisle and, through his work at Symantec and iSIGHT Partners, has helped countless organizations improve their security posture using more effective intelligence. Timothy Gallo has been working in IT security for the past 15 years, prior to that he's been a bouncer, a bartender, and a physicist. He loves finding new ways to do things and is working on building his very first art car for use at burning man this year.