Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them
暫譯: 勒索病毒攻擊的事件響應技術:了解現代勒索病毒攻擊並建立事件響應策略以應對這些攻擊

Skulkin, Oleg

  • 出版商: Packt Publishing
  • 出版日期: 2022-04-14
  • 售價: $2,000
  • 貴賓價: 9.5$1,900
  • 語言: 英文
  • 頁數: 228
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 180324044X
  • ISBN-13: 9781803240442
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and tools

Key Features

  • Understand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and procedures
  • Collect and analyze ransomware-related cyber threat intelligence from various sources
  • Use forensic methods and tools to reconstruct ransomware attacks and prevent them in the early stages

Book Description

Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that.

This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You'll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you'll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain.

By the end of this ransomware book, you'll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.

What you will learn

  • Understand the modern ransomware threat landscape
  • Explore the incident response process in the context of ransomware
  • Discover how to collect and produce ransomware-related cyber threat intelligence
  • Use forensic methods to collect relevant artifacts during incident response
  • Interpret collected data to understand threat actor tactics, techniques, and procedures
  • Understand how to reconstruct the ransomware attack kill chain

Who this book is for

This book is for security researchers, security analysts, or anyone in the incident response landscape who is responsible for building an incident response model for ransomware attacks. A basic understanding of cyber threats will be helpful to get the most out of this book.

商品描述(中文翻譯)

**探索現代人為操作的勒索病毒攻擊世界,並涵蓋正確調查這些攻擊的步驟,以及使用尖端方法和工具收集和分析網路威脅情報**

#### 主要特點

- 了解現代人為操作的網路攻擊,重點關注威脅行為者的戰術、技術和程序
- 從各種來源收集和分析與勒索病毒相關的網路威脅情報
- 使用取證方法和工具重建勒索病毒攻擊並在早期階段防止它們

#### 書籍描述

勒索病毒攻擊已成為全球許多公司的最強大和最持久的威脅。建立有效的事件響應計劃以防止勒索病毒攻擊至關重要,並可能幫助您避免重大損失。《勒索病毒攻擊的事件響應技術》旨在幫助您做到這一點。

本書首先討論勒索病毒的歷史,展示威脅環境隨著時間的變化,同時詳細介紹事件響應的過程。接著,您將學習如何收集和產出與勒索病毒相關的網路威脅情報,並了解威脅行為者的戰術、技術和程序。接下來,本書專注於各種取證文物,以重建人為操作的勒索病毒攻擊生命週期的每個階段。在結尾的章節中,您將掌握各種殺傷鏈,並發現一個新的殺傷鏈:統一勒索病毒殺傷鏈。

在本書結束時,您將具備建立針對所有勒索病毒攻擊的事件響應策略所需的技能。

#### 您將學到什麼

- 了解現代勒索病毒威脅環境
- 探索勒索病毒背景下的事件響應過程
- 發現如何收集和產出與勒索病毒相關的網路威脅情報
- 使用取證方法在事件響應過程中收集相關文物
- 解釋收集到的數據以了解威脅行為者的戰術、技術和程序
- 了解如何重建勒索病毒攻擊的殺傷鏈

#### 本書適合誰

本書適合安全研究人員、安全分析師或任何在事件響應領域中負責建立勒索病毒攻擊事件響應模型的人。對網路威脅的基本理解將有助於您充分利用本書。

目錄大綱

1. The History of Human-Operated Ransomware Attacks
2. The Life Cycle of a Human-Operated Ransomware Attack
3. The Incident Response Process
4. Cyber Threat Intelligence and Ransomware
5. Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures
6. Collecting Ransomware-Related Cyber Threat Intelligence
7. Digital Forensic Artifacts and Their Main Sources
8. Investigating Initial Access Techniques
9. Investigating Post-Exploitation Techniques
10. Investigating Data Exfiltration Techniques
11. Investigating Ransomware Deployment Techniques
12. The Unified Ransomware Kill Chain

目錄大綱(中文翻譯)

1. The History of Human-Operated Ransomware Attacks

2. The Life Cycle of a Human-Operated Ransomware Attack

3. The Incident Response Process

4. Cyber Threat Intelligence and Ransomware

5. Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures

6. Collecting Ransomware-Related Cyber Threat Intelligence

7. Digital Forensic Artifacts and Their Main Sources

8. Investigating Initial Access Techniques

9. Investigating Post-Exploitation Techniques

10. Investigating Data Exfiltration Techniques

11. Investigating Ransomware Deployment Techniques

12. The Unified Ransomware Kill Chain