Читать книгу Ransomware Protection Playbook - Grimes Roger A., Roger A. Grimes - Страница 2

Table of Contents

Оглавление

Cover

Title Page

Introduction Who This Book Is For What Is Covered in This Book? How to Contact Wiley or the Author

Part I: Introduction Chapter 1: Introduction to Ransomware How Bad Is the Problem? Types of Ransomware Summary Chapter 2: Preventing Ransomware Nineteen Minutes to Takeover Good General Computer Defense Strategy Understanding How Ransomware Attacks Preventing Ransomware Beyond Self-Defense Summary Chapter 3: Cybersecurity Insurance Cybersecurity Insurance Shakeout Did Cybersecurity Insurance Make Ransomware Worse? Cybersecurity Insurance Policies The Insurance Process What to Watch Out For Future of Cybersecurity Insurance Summary Chapter 4: Legal Considerations Bitcoin and Cryptocurrencies Can You Be in Legal Jeopardy for Paying a Ransom? Is It an Official Data Breach? Preserve Evidence Legal Defense Summary Summary

Part II: Detection and Recovery Chapter 5: Ransomware Response Plan Why Do Response Planning? When Should a Response Plan Be Made? What Should a Response Plan Include? Practice Makes Perfect Summary Chapter 6: Detecting Ransomware Why Is Ransomware So Hard to Detect? Detection Methods Example Detection Solution Summary Chapter 7: Minimizing Damage Basic Outline for Initial Ransomware Response Stop the Spread Initial Damage Assessment First Team Meeting Determine Next Steps Summary Chapter 8: Early Responses What Do You Know? A Few Things to Remember Major Decisions Early Actions Summary Chapter 9: Environment Recovery Big Decisions Rebuild Process Summary Recovery Process Summary Summary Chapter 10: Next Steps Paradigm Shifts Improve Overall Cybersecurity Hygiene Summary Chapter 11: What Not to Do Assume You Can't Be a Victim Think That One Super-Tool Can Prevent an Attack Assume Too Quickly Your Backup Is Good Use Inexperienced Responders Give Inadequate Considerations to Paying Ransom Lie to Attackers Insult the Gang by Suggesting Tiny Ransom Pay the Whole Amount Right Away Argue with the Ransomware Gang Apply Decryption Keys to Your Only Copy Not Care About Root Cause Keep Your Ransomware Response Plan Online Only Allow a Team Member to Go Rogue Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy Summary Chapter 12: Future of Ransomware Future of Ransomware Future of Ransomware Defense Summary Parting Words

Index

Copyright

Dedication

About the Author

10  About the Technical Editor

11  Acknowledgments

12  End User License Agreement

Ransomware Protection Playbook

Подняться наверх