Читать книгу Ransomware Protection Playbook - Grimes Roger A., Roger A. Grimes - Страница 11
Part I: Introduction
ОглавлениеPart I summarizes what ransomware does, how sophisticated it is, and how to prevent it from exploiting your organization and devices. Many people don't understand how mature ransomware is and even more don't concentrate enough on stopping it before it attacks.
Chapter 1, “Introduction to Ransomware” Chapter 1 covers ransomware starting with a little bit of history of the significant milestones and then discusses the very sophisticated and mature versions used today. The ransomware industry is run much more like a multilevel marketing firm/ecosystem than anything else. Chapter 1 will cover the common pieces and parts. As an encompassing introduction, it is also the longest chapter in the book.
Chapter 2, “Preventing Ransomware” Preventing ransomware is something that isn't talked about enough. The most recommended “prevention” control, a good backup, is not prevention at all. Chapter 2 will talk about the things every person and organization should be doing to prevent ransomware to the best of their ability. And in the process of discussing how to defeat ransomware, it will discuss how to best defeat all malicious hackers and malware.
Chapter 3, “Cybersecurity Insurance” The decision to purchase cyber insurance is a big dilemma for organizations facing the threat of ransomware. Cyber insurance is complex. Chapter 3 gives readers a basic understanding of cyber insurance, including the things that should be avoided when considering a policy. It ends with a frank discussion of the massive changes happening in the cybersecurity industry right now and where it's headed.
Chapter 4, “Legal Considerations” Chapter 4 covers the legal considerations involved with dealing with a successful ransomware attack, not only in the decision of whether to pay or not pay the ransom, although that is a big part of this chapter, but also how to use legal help to your benefit during an attack. Chapter 4 will contain tips and recommendations that every organization should utilize in their planning and responses to ransomware.