Ransomware : Penetration testing and contingency planning / Ravindra Das.
Material type:
TextSeries: Cyber shorts seriesPublisher: Boca Raton, FL : CRC Press, 2024Copyright date: ©2024Edition: First editionDescription: ix, 121 pages : illustrations ; 24 cmContent type: - text
- unmediated
- volume
- 9781032556697
- 005.8 D.R.R 23
- QA76.9.A25 D37 2024
| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main library | Computers & Information Technology ( Computer Science ) | 005.8 D.R.R (Browse shelf(Opens below)) | C.1 | Available | 00017371 |
Browsing Main library shelves Close shelf browser (Hides shelf browser)
| 005.8 D.C.I Internet security you can afford : using untangle as your internet gateway / | 005.8 D.H.M Mobile application security / | 005.8 D.R.B Beginning SQL Server for Developers / | 005.8 D.R.R Ransomware : Penetration testing and contingency planning / | 005.8 DRG Generative AI: Phishing and Cybersecurity Metrics/ | 005.8 DRG Generative AI and digital forensics / | 005.8 E.C.C Computer security fundamentals / |
Includes index.
1. Introduction 2. A Technical Review of Ransomware Attacks 3. The Importance of Penetration Testing 4. How to Recover from a Ransomware Attack 5. Conclusion
Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution. The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well.
Ravindra Das is a technical writer in the cybersecurity realm. He does cybersecurity consulting on the side through his private practice, RaviDas.Tech, Inc. He also holds the Certified in Cybersecurity certification from the ISC2.
There are no comments on this title.