Title Page
Preventing Digital Extortion
Mitigate ransomware, DDoS, and other cyber-extortion attacks
Dhanya Thakkar
BIRMINGHAM - MUMBAI
Copyright
Preventing Digital Extortion
Copyright 2017 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: May 2017
Production reference: 1240517
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.
ISBN 978-1-78712-036-5
www.packtpub.com
Credits
Author Dhanya Thakkar | Project Coordinator Virginia Dias |
Reviewer Abhijit Mohanta | Proofreader Safis Editing |
Acquisition Editor Prachi Bisht | Indexer Aishwarya Gangawane |
Content Development Editor Sweeny Dias | Graphics Kirk D'Penha |
Technical Editor Mohit Hassija | Production Coordinator Deepika Naik |
Copy Editor Safis Editing |
About the Author
A transformation specialist with over 20 years' experience as a business leader focused on the next generation of enterprise companies including security, Dhanya Thakkar understands how to help organizations drive innovation, compliance, and business efficiency while managing risk without compromising security. With a strong track record in leadership roles in top-tier technology firms and in various start-ups, he is recognized as an industry thought leader and is regularly quoted by the press on issues surrounding information security, cybercrime, and the future of technology by trade, national, and international media.
A highly dynamic and extremely skilled executive who successfully blends technological acumen and business skills, he has a proven track record in demonstrating to organizations how to operationalize their cyber security policies with effective tools, processes, and people.
He is the co-inventor of two patented technologies and has published articles on software technology. He earned his bachelor's degree in computer science from Maharaja Sayajirao University in India. He completed the Executive Program at Queens School of Business. He has helped create and grow multiple technology businesses and product lines to market-leading positions and is also a frequent speaker at conferences and forums around the world.
To my father, who in 1984 wrote a book titled "On the structuring of Sanskrit drama: structure of drama in Bharata and Aristotle." I could not understand most of his book. I decided that someday I would return the favor to him.
About the Reviewer
Abhijit Mohanta has a decade of experience in cyber security. He has worked as a security researcher for malware labs in Symantec, Mcafee, and Cyphort and has a rich experience in dealing with various kinds of cyber attacks involving web application vulnerabilities, operating system vulnerabilities, and malware. His expertise includes malware reverse engineering, vulnerability research, and Windows programming. He has published several blogs related to malware research and is passionate about exploring new technologies such as machine learning and big data. He is an active member in security communities such as Cysinfo.
Beyond computers, he is a fitness freak and a foodie. He loves to hit the gym daily, go swimming, and practice yoga.
I would like to thank my family and friends, who inspire and encourage me to explore new things in life.
www.PacktPub.com
For support files and downloads related to your book, please visit www.PacktPub.com .
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.PacktPub.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at service@packtpub.com for more details.
At www.PacktPub.com , you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
https://www.packtpub.com/mapt
Get the most in-demand software skills with Mapt. Mapt gives you full access to all Packt books and video courses, as well as industry-leading tools to help you plan your personal development and advance your career.
Why subscribe?
- Fully searchable across every book published by Packt
- Copy and paste, print, and bookmark content
- On demand and accessible via a web browser
Customer Feedback
Thanks for purchasing this Packt book. At Packt, quality is at the heart of our editorial process. To help us improve, please leave us an honest review on this book's Amazon page at https://www.amazon.com/dp/1787120368.
If you'd like to join our team of regular reviewers, you can e-mail us at . We award our regular reviewers with free eBooks and videos in exchange for their valuable feedback. Help us be relentless in improving our products!
Preface
In todays digital age, hacking into data, encrypting it, and making it inaccessible is becoming more and more commonplace. Irrespective of the scale of your business, such an attack can prove very costly. If you want to save yourself from such cyber extortion, it is important to gain insights into various attacks and their impact on your business. This book gives you a brief overview of the process and will also teach you to mitigate or eliminate such attacks. It will not only teach you about cyber attacks, but will also equip you to mitigate them. Be it computers, smartphones, servers, or IoT devices this step by step practical guide will teach you to secure any environment. Apart from this, we will also teach you to leverage various security tools available.
What this book covers
, Introduction to Cyber Extortion, is an overview of the concept of cyber crime and how cyber extortion fits into overall cyber crime.
Next page