Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a solid defensive mechanism in place for workstations and servers in an organization.
Preventing Ransomware starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware.
We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. Then, we move on to how the ransom is paid and the negative effects of doing so.
You will learn how to respond quickly to ransomware attacks. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators.
In the concluding chapters, you will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.
By the end of this book, you will have extensive knowledge of the trending malware in the tech industry at present.
What you will learn
- Understand malware types and techniques with examples
- Obtain a quick malware analysis
- Understand ransomware techniques, their distribution and payment mechanism
- Case studies of famous ransomware attacks
- Discover detection technologies for complex malware and ransomware
- Configure security software to protect against ransomware
- Handle ransomware infections
Who This Book Is For
Preventing Ransomware is targeted toward security administrator, security analysts, or any stakeholders in the security sector who want to learn about the most trending malware in the current market: ransomware.
Table of Contents
- Malware from Fun to Profit
- Malware Analysis Fundamentals
- Ransomware Distribution
- Ransomware Techniques for Hijacking the System
- Ransomware Economics
- Case Study of Famous Ransomware
- Other Forms of Digital Extortion
- Ransomware Detection and Prevention
- Incident Response
- The Future of Ransomware
About The Authors
Abhijit Mohanta has worked in the Cybersecurity Industry for 15+ years with specialization in the area of Malware Analysis and Detection and has several patents in the field of Malware Detection.
He has worked in areas of Malware analysis, Digital Forensics, Vulnerability Research, Exploits. He has been engaged in development of Antivirus, Sandbox and EDR products in top security companies which includes Mcafee, Symantec, Juniper Networks and Uptycs.
He has been an instructor at security training organized by prestigious institutions like DRDO, AICTE and NASSCOM He spoke at conferences like AVAR, SANS, AISS. He has several patents and blogs related to Malware analysis and Detection.
Mounir Hahad, Head of Threat Research at Juniper Networks, is a seasoned cybersecurity expert focused on malware research, detection techniques and threat intelligence.
He leads Juniper Threat Labs, the organization at Juniper Networks identifying and tracking malicious threats in the wild and ensuring Juniper products implement effective detection techniques and have access to the latest threat intelligence needed to block malicious attacks.
Prior to joining Juniper, Hahad was the Head of Cyphort Labs and has held various leadership roles with Cisco and IronPort in a professional career spanning over 20 years.
Kumaraguru Velmurugan has 10+ years’ experience in malware analysis and remedial measures. He has been associated with different antivirus and sandbox products in his career. He is a passionate reverse engineer, interested in assembly programming, automation in the cyber security domain. He has authored as well as assisted technically in blogging over interesting key features employed by malware and owns a patent on malware remedial measures.
*Disclaimer: As an Amazon Associate we earn from qualifying purchases.