Ransomware
Penetration Testing and Contingency Planning
Seiten
2023
CRC Press (Verlag)
978-1-032-55667-3 (ISBN)
CRC Press (Verlag)
978-1-032-55667-3 (ISBN)
Ransomware attacks have become much more covert and stealthier, than when they first came out. In this book, the author provides an overview of what Ransomware is all about, and the timeline of its evolution.
Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution.
The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well.
Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution.
The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well.
Ravindra Das is a technical writer in the cybersecurity realm. He does cybersecurity consulting on the side through his private practice, RaviDas.Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC2.
Acknowledgment. Introduction. Chapter 1 The History of Ransomware. Chapter 2 A Technical Review of Ransomware Attacks. Chapter 3 The Importance of Penetration Testing. Chapter 4 How to Recover from a Ransomware Attack. Chapter 5 Conclusions. INDEX.
Erscheinungsdatum | 28.12.2023 |
---|---|
Reihe/Serie | Cyber Shorts |
Zusatzinfo | 16 Tables, black and white; 9 Line drawings, black and white; 10 Halftones, black and white; 19 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 340 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Wirtschaft ► Volkswirtschaftslehre | |
ISBN-10 | 1-032-55667-6 / 1032556676 |
ISBN-13 | 978-1-032-55667-3 / 9781032556673 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €