Ransomware Revealed:A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks

勒索软件揭密:保护与从勒索软件攻击中恢复的初学者指南

计算机系统结构

原   价:
328.75
售   价:
263.00
优惠
平台大促 低至8折优惠
发货周期:预计8-10周发货
作      者
出  版 社
出版时间
2019年11月07日
装      帧
平装
ISBN
9781484242544
复制
页      码
218
语      种
英文
综合评分
暂无评分
我 要 买
- +
库存 50 本
  • 图书详情
  • 目次
  • 买家须知
  • 书评(0)
  • 权威书评(0)
图书简介
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly.Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future.Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems.What You Will LearnBe aware of how ransomware infects your systemComprehend ransomware components in simple termsRecognize the different types of ransomware familiesIdentify the attack vectors employed by ransomware to infect computer systemsKnow how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies)Know what to do if a successful ransomware infection takes placeUnderstand how to pay the ransom as well as the pros and cons of payingSet up a ransomware response plan to recover from such attacksWho This Book Is ForThose who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book’s content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.
本书暂无推荐
本书暂无推荐
看了又看
  • 上一个
  • 下一个