DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Book

Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

By Abhijit Mohanta, Mounir Hahad, and Kumaraguru Velmurugan

Reading Time: 2 mins read
in Book, Ransomware

Book Description

Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a solid defensive mechanism in place for workstations and servers in an organization.

Preventing Ransomware starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware. We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. Then, we move on to how the ransom is paid and the negative effects of doing so.

You will learn how to respond quickly to ransomware attacks. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators. In the concluding chapters, you will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.

By the end of this book, you will have extensive knowledge of the trending malware in the tech industry at present.

What you will learn

  • Understand malware types and techniques with examples
  • Obtain a quick malware analysis
  • Understand ransomware techniques, their distribution and payment mechanism
  • Case studies of famous ransomware attacks
  • Discover detection technologies for complex malware and ransomware
  • Configure security software to protect against ransomware
  • Handle ransomware infections

Who This Book Is For

Preventing Ransomware is targeted toward security administrator, security analysts, or any stakeholders in the security sector who want to learn about the most trending malware in the current market: ransomware.

Table of Contents

  1. Malware from Fun to Profit
  2. Malware Analysis Fundamentals
  3. Ransomware Distribution
  4. Ransomware Techniques for Hijacking the System
  5. Ransomware Economics
  6. Case Study of Famous Ransomware
  7. Other Forms of Digital Extortion
  8. Ransomware Detection and Prevention
  9. Incident Response
  10. The Future of Ransomware

 

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Tags: Abhijit MohantaBooksCyber Professionals BooksKumaraguru VelmuruganMounir HahadRansomwareRansomware Books
ADVERTISEMENT

Related Posts

The Zero Trust Framework – Book

The Zero Trust Framework – Book

March 28, 2023
The Zero Trust Framework – Book

The Zero Trust Framework – Book

March 28, 2023
Multifactor Authentication A Clear and Concise Reference

Multifactor Authentication A Clear and Concise Reference

March 28, 2023
The 2023-2028 World Outlook for Multifactor Authentication

The 2023-2028 World Outlook for Multifactor Authentication

March 28, 2023

More Articles

Cyber101

GLBA – Definition

June 7, 2022
Document

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

December 5, 2020
Incidents

Hacktivists hacked Iranian State TV during President’s speech on Revolution Day

February 14, 2023

All In One WP Security & Firewall WordPress

September 1, 2020
Alerts

[Control Systems] Emerson Security Advisory

December 22, 2021
Jobs

Director, Security Research

October 18, 2022
Alerts

BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers

June 16, 2022
Book

Securing DevOps: Security in the Cloud

March 30, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.