Für diesen Artikel ist leider kein Bild verfügbar.

Preventing Ransomware

Buch | Softcover
266 Seiten
2018
Packt Publishing Limited (Verlag)
978-1-78862-060-4 (ISBN)
32,40 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Your one-stop guide to know digital extortion and it's prevention.

About This Book
• A complete guide to how ransomware works
• Build a security mechanism to prevent digital extortion.
• A practical approach to knowing about, and responding to, ransomware.

Who This Book Is For
This book is targeted towards security administrator, security analysts, or any stakeholders in the security sector who want to learn about the most trending malware in the current market: ransomware.

What You Will Learn
• Understand malware types and malware techniques with examples
• Obtain a quick malware analysis
• Understand ransomware techniques, their distribution, and their payment mechanism
• Case studies of famous ransomware attacks
• Discover detection technologies for complex malware and ransomware
• Configure security software to protect against ransomware
• Handle ransomware infections

In Detail
Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization.
This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware. We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. We will then move on to how the ransom is paid and the negative effects of doing so. You will learn how to respond quickly to ransomware attacks and how to protect yourself. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators. You will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.
By the end of this book, you will have end-to-end knowledge of the trending malware in the tech industry at present.

Style and approach
The practical end to end guide which helps security administrators, security analysts, or any stakeholders in the security sector to learn about ransomware attack and its prevention.

Abhijit Mohanta has a decade of experience in cybersecurity. He works as a security researcher at Juniper Networks. He has worked with Cyphort (now part of Juniper), McAfee, and Symantec as a security researcher. His expertise includes reverse-engineering, automation, malware analysis, Microsoft Windows programming, and machine learning. He has worked on antivirus, sandboxes, and intrusion prevention systems. He has also authored a number of blogs about malware and has a couple of patents pending related to malware detection. Mounir Hahad head of threat research at Juniper Networks, is a cybersecurity expert focused on malware research, detection techniques, and threat intelligence. Prior to joining Juniper, he was the head of threat research at Cyphort, a company focused on advanced threat detection and security analytics. He has also held various leadership positions at Cisco and IronPort working on VPN, UTM, email, and web security. He holds a PhD in computer science from the University of Rennes in France. Kumaraguru Velmurugan has over 10 years of experience in malware analysis and remedial measures. He has been associated with different antivirus and sandbox products in his career. He is a passionate reverse engineer and is interested in assembly programming and automation in the cybersecurity domain. He has authored and assisted technically in blogging about interesting key features employed by malware and owns a patent on malware remedial measures.

Table of Contents

Malware from Fun to Profit
Malware Analysis Fundamentals
Ransomware Distribution
Ransomware Techniques for Hijacking the System
Ransomware Economics
Case Study of Famous Ransomware
Other Forms of Digital Extortion
Ransomware Detection and Prevention
Incident Response
The Future of Ransomware

Erscheinungsdatum
Verlagsort Birmingham
Sprache englisch
Maße 191 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-78862-060-7 / 1788620607
ISBN-13 978-1-78862-060-4 / 9781788620604
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00