eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 4 of 52

Table of Contents iii These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Table of Contents INTRODUCTION ............................................................................................... 1 About This Book ................................................................................... 1 Foolish Assumptions ............................................................................ 1 Icons Used in This Book ....................................................................... 2 Beyond the Book .................................................................................. 2 CHAPTER 1: What Is Ransomware? ............................................................. 3 Defining Ransomware ......................................................................... 3 Recognizing Ransomware in the Modern Threat Landscape ......... 4 Understanding How Ransomware Operates .................................... 7 CHAPTER 2: Implementing Best Practices to Reduce Ransomware Risks ..................................................................... 9 Before an Attack: Discover, Enforce, Harden .................................... 9 During an Attack: Detect, Block, and Defend .................................. 14 After an Attack: Scope, Contain, and Remediate ............................ 15 CHAPTER 3: Building the "New Best-of-Breed" Security Architecture ............................................................. 17 Recognizing the Limitations of Current Security Designs ............. 17 Defining the "New Best-of-Breed" Security Architecture ............... 19 CHAPTER 4: Deploying Cisco Ransomware Defense ................... 25 Leveraging DNS as the First Line of Defense in the Cloud ............ 25 Securing Endpoints and Addressing Email Threats ....................... 30 Cisco Advanced Malware Protection (AMP) for Endpoints ................................................................................. 31 Cisco Email Security with Advanced Malware Protection (AMP) ........................................................................... 32 Protecting the Network with Next-Generation Firewalls and Segmentation ...................................................................................... 34 Cisco Firepower Next-Generation Firewall (NGFW) .................. 34 Use the network as a sensor and enforcer................................ 35 Streamlining Deployments and Bolstering Incident Response .............................................................................. 36

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook