Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Windows Ransomware Detection and Protection

You're reading from   Windows Ransomware Detection and Protection Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender

Arrow left icon
Product type Paperback
Published in Mar 2023
Publisher Packt
ISBN-13 9781803246345
Length 290 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Author (1):
Arrow left icon
Marius Sandbu Marius Sandbu
Author Profile Icon Marius Sandbu
Marius Sandbu
Arrow right icon
View More author details
Toc

Table of Contents (16) Chapters Close

Preface 1. Part 1:Ransomware Basics
2. Chapter 1: Ransomware Attack Vectors and the Threat Landscape FREE CHAPTER 3. Chapter 2: Building a Secure Foundation 4. Part 2:Protect and Detect
5. Chapter 3: Security Monitoring Using Microsoft Sentinel and Defender 6. Chapter 4: Ransomware Countermeasures – Windows Endpoints, Identity, and SaaS 7. Chapter 5: Ransomware Countermeasures – Microsoft Azure Workloads 8. Chapter 6: Ransomware Countermeasures – Networking and Zero-Trust Access 9. Chapter 7: Protecting Information Using Azure Information Protection and Data Protection 10. Part 3:Assume Breach
11. Chapter 8: Ransomware Forensics 12. Chapter 9: Monitoring the Threat Landscape 13. Chapter 10: Best Practices for Protecting Windows from Ransomware Attacks 14. Index 15. Other Books You May Enjoy

Summary

In this chapter, we took a closer look at some of the main attack vectors that ransomware operators are using to get their foot in the door, by either using existing credentials or phishing attacks to lure end users and gain access to a compromised machine.

In most cases, attackers utilize one or multiple vulnerabilities either directly on an end user’s machine or to exploit external services that the organization has available.

We also took a look at some of the extortion tactics attackers use, in addition to other attack vectors, such as DDoS attacks, to pressure organizations into paying the ransom.

Then, we looked closer at some of the more well-known ransomware operators and their modus operandi, as well as some of the more frequently used attack vectors regarding identity and exploiting vulnerabilities and how they have been used in successful attacks.

Finally, we looked into how to monitor vulnerabilities and some of the sources that can be useful assets in your toolbox.

In the next chapter, we will start to look at countermeasures and build a secure foundation for our IT services, as well as adopt a zero-trust-based security architecture.

You have been reading a chapter from
Windows Ransomware Detection and Protection
Published in: Mar 2023
Publisher: Packt
ISBN-13: 9781803246345
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image