万本电子书0元读

万本电子书0元读

顶部广告

Preventing Digital Extortion电子书

售       价:¥

67人正在读 | 0人评论 9.8

作       者:Dhanya Thakkar

出  版  社:Packt Publishing

出版时间:2017-05-26

字       数:47.4万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:此类商品不支持退换货,不支持下载打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Learn the art of preventing digital extortion and securing confidential data About This Book ? Get acquainted with multiple cyber extortion attacks and techniques to mitigate them ? Learn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloud ? A concise, fast-paced guide that develops your skills in protecting confidential data by leveraging widely used tools Who This Book Is For This book targets IT security managers, IT security engineers, security analysts, and professionals who are eager to avoid digital extortion for themselves or their organizations. They may have heard of such attacks but are not aware of their various types, techniques, and business impact. What You Will Learn ? Delve into the various types, stages, and economics of digital extortion ? Understand the science behind different attacks ? Understand the gravity of and mechanics behind ransomware and prevent and mitigate data breaches and financial losses ? Use effective tools to defend against ransomware ? Analyze attacks, the money flow, and cyber insurance processes ? Learn the art of preventing digital extortion and securing confidential data ? Get an idea of the future of extortion tactics and how technological advances will affect their development In Detail More and more cyber threats keep emerging every day, affecting organizations across the board, targeting the entire spectrum of the Internet. Digital--or cyber--extortion so far has come across as the most serious of such threats as it seeks to profit from criminal activity, akin to blackmail. Such extortion has been rising exponentially in the digital age and has become a huge illegal money-making business, affecting users and organizations ranging from small businesses to large enterprises. This is an insightful study spelling out in detail the ways and means employed by cyber criminals in targeting various devices and the multiple dangers such malicious activity embodies. Here will be found an overview of methods employed to impact and infect computers, smartphones, servers, and the IoT for cyber extortion. Then, it will move on to specific subjects in more detail, covering attacks such as DDoS-based extortion, cryptoviruses, and ransomware. You will learn how to prevent such attacks and eliminate them if you are compromised. This book will help you become a pro at securing your data and preventing your organization from paying a hefty ransom. Style and approach This step-by-step guide will start with the fundamentals of digital or cyber extortion and the various techniques used by hackers to demand ransom from an organization. It also focuses on types of ransomware and how it can infect your computer, mobile, cloud, server, and IOT. This practical guide will also explain how you can eliminate such attacks by leveraging various open source/commercial tools.
目录展开

Title Page

Copyright

Credits

About the Author

About the Reviewer

www.PacktPub.com

Customer Feedback

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

Introduction to Cyber Extortion

Cybercrime - underdefined and underregulated

The concept of cybercrime

Critical attributes of cybercrime

Where and how - realm

Why - motivation

Who - the criminal deed component

Types of common cyber threats

Cybercrime targeting consumers

Cybercrime targeting businesses

Cybercrime in relation to overall computer crime

Cybercrime localized - what is the risk in your region?

North and South America

Europe

Asia

Africa

Australia and Oceania

Cybercrime in numbers

A peculiar perspective - cybercrime in absolute and normalized numbers

Digital extortion

The odd beginnings of digital extortion

Extortion-based malware

Types of digital extortion

Distributed denial of service (DDoS) attacks

Taxonomy of DDoS attacks

Typical DDoS attacks

DRDoS attacks

Notable DDoS attacks

Data theft extortion

Preventing data theft extortion

Mobile extortion

Android

iOS

Sextortion

Sextortion techniques

Bug poaching

Corporate extortion

Ransomware

Ransomware - crypto

Ransomware - locker

Ransomware propogation techniques

Traffic redirection

E-mail attachments

Botnets

Social engineering

Ransomware-as-a-Service (RaaS)

Evolution of ransomware

Statistics of ransomware evolution - misleading applications give way to cryptoware

SpySherriff

Gpcoder

Cryzip

Archiveus

Randsom.C

SMS ransomware

MBR ransomware

The rise of ransomware

Police ransomware - Reveton

Patched malware

Reemergence of crypto-ransomware

CryptoLocker

TROJ_UPATRE

WORM_CRILOCK.A

Cryptorbit

Cryptocurrency theft

The Angler exploit kit

Ransomware in 2016 and beyond

Locky

Petya

Cerber

Samsam

Jigsaw

Is ransomware financially viable?

Dynamic pricing of ransomware

Across countries

Across targeted victims

History of payment methods

Bitcoin - the ideal ransom method

Industries and services affected - is your company under threat?

Top targeted industries

Healthcare

Manufacturing

Financial services

Government agencies

Transportation

Ransomware statistics - malware variants and affected devices

Total malware

Mobile malware

Rootkit malware

The macOS malware

Ransomware

Malicious signed binaries

Macro malware

Worldwide botnet prevalence

Network attacks

Summary

DDoS Extortion

DDoS extortion - ransomware's older cousin

Specific sectors at risk

Why is it hard to defend against these attacks?

The science behind DDoS attacks

Evolution of DDoS attacks types

Inside DDoS attacks

Bandwidth attacks

DNS attacks

Application attacks

HTTP attacks

Low bandwidth HTTP denial of service attacks

Attack tools

The botnet as a DDoS tool

Attack groups

The Armada Collective

Lizard Squad

DD4BC

Imposters

Kadyrovtsy

RedDoor

ezBTC Squad

Defense techniques

Tools to protect against DDoS attacks

Mitigation techniques

For bandwidth exhaustion attacks

For resource exhaustion

For application-based attacks

Leading practices for enterprises

Future trends

Summary

Avoiding Data Theft Extortion

Data theft

The enterprise view

Extortion e-mail schemes tied to data theft

Method of breach

Hacking or malware are the prime go-to breach methods

Account thefts - accounts for sale

Mobile phone, eBay, Uber, and PayPal accounts for sale

Bank login credentials for sale

Credit card sales are brand agnostic

PII prices fall due to oversupply

The perceived and actual monetary values

Defending against data and account theft extortion

Enterprise security measures

Business E-mail Compromise (BEC)

The fraudsters at your gates

How impersonators fake you out

The statistics behind Business E-mail Compromise (BEC)

How do BEC schemes work?

Fraudsters approach to e-mail

The apt one shot e-mail

The conversationalist

Which company positions are most targeted in BEC schemes

How to defend against BEC?

Fighting against these type of scams

What to do when hit by the BEC scam

Summary

Mitigating Locker Ransomware

Why is lockerware a major field player?

Screen locking command process

The convenience of payment vouchers

Reveton - when the police locks your screen

From delivery to execution

Lockerware delivery

Payload carriers

Infection spreading

Lockerware execution

Desktop locking techniques

Stages of lockerware development in action

Infrastructure preparation

Exploit kits

Traffic redirection

Spreading the infection

How to cash out - money laundering techniques

The advancement of locker ransomware - Winlock

Reveton takes over the world

Modern variants of police ransomware

Reveton strikes against OS X

Android.Lockscreen

ANDROIDOS_LOCKER.A - a new name with the same tactics

Best practices for mitigating Lockerware

Science verdict - three advanced malware mitigation strategies

API call monitoring

Monitoring filesystem activity

Installing decoy resources

Mitigating lockerware - a comprehensive action review

Response plan development

Security awareness and education

Patching

Robust monitoring

Restrictions to unnecessary services

Disabling services

Restricting software

Blocking IP addresses

Removing unused devices

File exchange management

Discerning effects of e-mail security

Software updates

Data backup

Cloud storage and security solutions

File history or system protection recovery

Mitigation by deception technology

Quick five-step guide for businesses under attack

Summary

Crypto Ransomware Prevention Techniques

Crypto ransomware

Crypto ransomware - scenarios and variants

CryptoLocker

Locky

TeslaCrypt

CryptoWall

CTBLocker

Ransomware's targets

Businesses of all sizes

The healthcare sector

Public agencies - educational institutions and law enforcement agencies

Financial institutions

Home users

Stages of ransomware

Initial infection and exploitation

War driving

E-mail attachments

Drive-by downloads

Phishing campaigns

Targeted attacks

Command and Control (C2)

Encryption/locking - delivery and execution

File encryption

Ransomware encrypting files

Public key download

Embedded public key

Embedded keys

Ransomware locking screens

Windows and mobile locker ransomware

Holding hostage

Propagation

Defense in depth

Defining a security architecture

Need for a security architecture

Following the principle of least privilege

Perimeter defense controls

Endpoint protection

Firewalls

Firewall classification

Key requirements

Intrusion Prevention System (IPS)

Key requirements

Key network security controls

Vulnerability assessments

Configuration management

Patch management

Vulnerability remediation management

Assessing ports, services, and protocols

Secure software installation

Specific measures

Summary

Exploring Mobile Extortions

Mobile malware - an increasing security risk

Mobile ransomware

Common infection vectors

Malware Command and Control communication

Malware self-protection

Analysis of mobile malware sample - SMS Zombie

Analysis observations

Static analysis

Ransomware timeline

Android Defender

Police ransomware

Simplocker

Simplocker distribution vectors

Simplocker in English

Lockerpin

Lockerpin's aggressive self-defense

Jisut

Protecting your mobile phone

Future predictions

Summary

Follow the Money

Cryptocurrency

Blockchain

How does a blockchain transaction work

Common misconceptions about blockchain technology

Bitcoins

Quick facts about Bitcoin

Currency denomination

Samples of transactions and blocks

Protocol weakness

Security concerns

Economics of Bitcoin

Bitcoin - myth busters

Why is it so difficult to catch attackers?

Ransomware as a Service

Dissecting RaaS with Cerber

Tracing the flow of money

Summary

Held Hostage – What Now?

To pay or not to pay

Hollywood Presbyterian medical center - Impact based scenario

Analyzing and responding

Preference 1 - situation being controlled by the Incident Response (IR) team

Preference 2 - implementing a security solution (without an Information Security team)

Preference 3 - trying to recover the data

Preference 4 - paying the ransom

Cyber insurance review

Cyber threat landscape and the impact of cyber risk

The growing need for cyber insurance

Cyber insurance coverage

Maturation of the cyber insurance market

Typical coverage provided by cyber insurance

Typical cyber insurance underwriting process

Considerations while selecting cyber insurance

Cyber insurance focused risk assessment

Performing current state cyber risk assessment

Assessing cyber insurance options

Conducting fit-gap analysis

Developing strategy and recommendations

The moral dilemma of malware

Using endpoint protection solutions

Hardening systems

Ports, services, and protocols

Secure software installation

Handling information assets and private information

Protection from spamming and phishing

Protection from social engineering

Backup

Why do we need backups?

What is a recovery?

Summary

Extortion of the Future

What does the future hold for ransomware?

Focus on operational security

Ransomware everywhere

Malware on your wrist

Malware on wearables

Internet of Things (IoT) meets malware and extortion

Internet of Things (IoT)

Assessing embedded and IoT devices

The common security observation

Transforming the business model

Summary

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部