Preventing Digital Extortion

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Preventing Digital Extortion by Dhanya Thakkar, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dhanya Thakkar ISBN: 9781787125971
Publisher: Packt Publishing Publication: May 26, 2017
Imprint: Packt Publishing Language: English
Author: Dhanya Thakkar
ISBN: 9781787125971
Publisher: Packt Publishing
Publication: May 26, 2017
Imprint: Packt Publishing
Language: English

Learn the art of preventing digital extortion and securing confidential data

About This Book

  • Get acquainted with multiple cyber extortion attacks and techniques to mitigate them
  • Learn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloud
  • A concise, fast-paced guide that develops your skills in protecting confidential data by leveraging widely used tools

Who This Book Is For

This book targets IT security managers, IT security engineers, security analysts, and professionals who are eager to avoid digital extortion for themselves or their organizations. They may have heard of such attacks but are not aware of their various types, techniques, and business impact.

What You Will Learn

  • Delve into the various types, stages, and economics of digital extortion
  • Understand the science behind different attacks
  • Understand the gravity of and mechanics behind ransomware and prevent and mitigate data breaches and financial losses
  • Use effective tools to defend against ransomware
  • Analyze attacks, the money flow, and cyber insurance processes
  • Learn the art of preventing digital extortion and securing confidential data
  • Get an idea of the future of extortion tactics and how technological advances will affect their development

In Detail

More and more cyber threats keep emerging every day, affecting organizations across the board, targeting the entire spectrum of the Internet. Digital--or cyber--extortion so far has come across as the most serious of such threats as it seeks to profit from criminal activity, akin to blackmail. Such extortion has been rising exponentially in the digital age and has become a huge illegal money-making business, affecting users and organizations ranging from small businesses to large enterprises.

This is an insightful study spelling out in detail the ways and means employed by cyber criminals in targeting various devices and the multiple dangers such malicious activity embodies.

Here will be found an overview of methods employed to impact and infect computers, smartphones, servers, and the IoT for cyber extortion. Then, it will move on to specific subjects in more detail, covering attacks such as DDoS-based extortion, cryptoviruses, and ransomware. You will learn how to prevent such attacks and eliminate them if you are compromised. This book will help you become a pro at securing your data and preventing your organization from paying a hefty ransom.

Style and approach

This step-by-step guide will start with the fundamentals of digital or cyber extortion and the various techniques used by hackers to demand ransom from an organization. It also focuses on types of ransomware and how it can infect your computer, mobile, cloud, server, and IOT. This practical guide will also explain how you can eliminate such attacks by leveraging various open source/commercial tools.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Learn the art of preventing digital extortion and securing confidential data

About This Book

Who This Book Is For

This book targets IT security managers, IT security engineers, security analysts, and professionals who are eager to avoid digital extortion for themselves or their organizations. They may have heard of such attacks but are not aware of their various types, techniques, and business impact.

What You Will Learn

In Detail

More and more cyber threats keep emerging every day, affecting organizations across the board, targeting the entire spectrum of the Internet. Digital--or cyber--extortion so far has come across as the most serious of such threats as it seeks to profit from criminal activity, akin to blackmail. Such extortion has been rising exponentially in the digital age and has become a huge illegal money-making business, affecting users and organizations ranging from small businesses to large enterprises.

This is an insightful study spelling out in detail the ways and means employed by cyber criminals in targeting various devices and the multiple dangers such malicious activity embodies.

Here will be found an overview of methods employed to impact and infect computers, smartphones, servers, and the IoT for cyber extortion. Then, it will move on to specific subjects in more detail, covering attacks such as DDoS-based extortion, cryptoviruses, and ransomware. You will learn how to prevent such attacks and eliminate them if you are compromised. This book will help you become a pro at securing your data and preventing your organization from paying a hefty ransom.

Style and approach

This step-by-step guide will start with the fundamentals of digital or cyber extortion and the various techniques used by hackers to demand ransom from an organization. It also focuses on types of ransomware and how it can infect your computer, mobile, cloud, server, and IOT. This practical guide will also explain how you can eliminate such attacks by leveraging various open source/commercial tools.

More books from Packt Publishing

Cover of the book Building Modern Networks by Dhanya Thakkar
Cover of the book Developing RESTful Web Services with Jersey 2.0 by Dhanya Thakkar
Cover of the book Seam 2.x Web Development by Dhanya Thakkar
Cover of the book Mastering Play Framework for Scala by Dhanya Thakkar
Cover of the book Mastering VMware vSphere 6.5 by Dhanya Thakkar
Cover of the book Mastering Spring Application Development by Dhanya Thakkar
Cover of the book Moodle 2.5 Multimedia Cookbook - Second Edition by Dhanya Thakkar
Cover of the book jQuery UI Themes Beginner's Guide by Dhanya Thakkar
Cover of the book Instant Traffic Analysis with Tshark How-to by Dhanya Thakkar
Cover of the book Getting Started with BizTalk Services by Dhanya Thakkar
Cover of the book Getting Started with Oracle WebLogic Server 12c: Developers Guide by Dhanya Thakkar
Cover of the book Mastering Zendesk by Dhanya Thakkar
Cover of the book Mastering Scientific Computing with R by Dhanya Thakkar
Cover of the book Alfresco CMIS by Dhanya Thakkar
Cover of the book IBM DB2 9.7 Advanced Administration Cookbook by Dhanya Thakkar
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy