Ransomware: Defending Against Digital Extortion

"O'Reilly Media, Inc."
Free sample

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.

Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.

  • Learn how ransomware enters your system and encrypts your files
  • Understand why ransomware use has grown, especially in recent years
  • Examine the organizations behind ransomware and the victims they target
  • Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns
  • Understand how ransom is paid—and the pros and cons of paying
  • Use methods to protect your organization’s workstations and servers
Read more

About the author

Allan Liska has more than 15 years experience in the world of cyber security. Mr Liska has worked both as a security practitioner and an ethical hacker, so he is familiar with both sides of the security aisle and, through his work at Symantec and iSIGHT Partners, has helped countless organizations improve their security posture using more effective intelligence.

In addition to security experience, Mr Liska also authored the books “The Practice of Network Security”, “Building an Intelligence-Led Security Program” and he co-authored the book “DNS Security” and contributed the security-focused chapters to “The Apache Administrators Handbook.”

Timothy Gallo has been working in IT security for the past 15 years, prior to that he’s been a bouncer, a bartender, and a physicist. He loves finding new ways to do things and is working on building his very first art car for use at burning man this year.

Read more

Reviews

Loading...

Additional Information

Publisher
"O'Reilly Media, Inc."
Read more
Published on
Nov 21, 2016
Read more
Pages
190
Read more
ISBN
9781491967836
Read more
Language
English
Read more
Genres
Computers / Security / Cryptography
Computers / Security / General
Computers / Security / Networking
Computers / Security / Viruses & Malware
Read more
Content Protection
This content is DRM free.
Read more
Read Aloud
Available on Android devices
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Allan Liska
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.

Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents.

The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.

Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company.Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence.Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
Allan Liska
Allan Liska
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.

Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents.

The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.

Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company.Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence.Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
©2017 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.