Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether youll ever recover.You must be ready. With this book, you will be.Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source.Understand different forms of cyber extortion and how they evolvedQuickly recognize indicators of compromiseMinimize losses with faster triage and containmentIdentify threats, scope attacks, and locate "patient zero"Initiate and manage a ransom negotiation--and avoid costly mistakesDecide whether to pay, how to perform due diligence, and understand risksKnow how to pay a ransom demand while avoiding common pitfallsReduce risks of data loss and reinfectionBuild a stronger, holistic cybersecurity program that reduces your risk of getting hackedThis guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others.Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Why do some organizations emerge from a data breach unscathed, while others are badly damaged, or even collapse? How can you make smart choices to protect your organization before and after a data breach? This book exposes the high-octane world of data breach disclosure and response, where IT help desk staff have the power to save or destroy a company, and cutting-edge attorneys must often parachute in to save the day. You'll watch as one of the world's most experienced cybersecurity professionals dissects high-profile data breaches, reveals what happened, and reveals exactly what you can do to navigate a massive data breach -- quickly mitigating damage to your digital assets, finances, and organizational reputation. Sherri Davidoff teaches through storytelling, making this book powerfully accessible and practically useful to everyone from the boardroom to the server closet. Along the way, she reveals what the press didn't cover about attacks on ChoicePoint, TJ Maxx, Heartland, Target, Anthem, and many other leading organizations -- and presenting specific lessons you can start applying right now, regardless of your technical or business infrastructure. Drawing on her immense personal experience with digital forensics, incident response, security awareness training, penetration testing, and web security assessment -- and her work teaching in venues from Black Hat to the Department of Defense -- Davidoff introduces today's most comprehensive and practical framework for data breach response. You'll discover: Critical turning points throughout data breach events, and how to respond to each of them How breach response lifecycles are changing: why classic incident response approaches are no longer sufficient, and what to do instead How internal politics can affect data breach response, and what to do about it How to read between the lines of public statements and notifications (or lack thereof) What you need to know about breaches in retail and other specific industries -- and the limitations of standards such as PCI/DSS How to protect against and recover from ransomware How to assess products and services such as Commercial Off-The-Shelf Breach Response, cybersecurity insurance, and crisis management services What you can do right now to make breach response less traumatic An insider's guide offering a new, systematic, and practical framework for data breach response: finally, an accessible, comprehensive playbook for what to do when Built around in-depth and highly-specific case studies: what really happened at ChoicePoint, TJ Maxx, Heartland, Target, Anthem, Sony, Children's Hospital Boston, and more Identifies critical decision points in high-profile data breaches, and explores the risks and benefits of the choices that were made at the time Written by the hacker featured in the bestseller 'Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"How to protect your organization against massive data breaches, and mitigate the financial and reputational consequences if they happen An insider's guide offering a new, systematic, and practical framework for data breach response: finally, an accessible, comprehensive playbook for what to do when Built around in-depth and highly-specific case studies: what really happened at ChoicePoint, TJ Maxx, Heartland, Target, Anthem, Sony, Children's Hospital Boston, and more Identifies critical decision points in high-profile data breaches, and explores the risks and benefits of the choices that were made at the time
Learn to recognize hackers' tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect's web surfing history-and cached web pages, too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.