Crypsy. How to respond to attacks using robber programs. Skulkin O.
“encryptions” are programs that find vulnerabilities in the networks of enterprises, so that with the help of these vulnerabilities, infiltrate the network, take possession of the information valuable for the enterprise and then extol money from the company's management. Of course, these programs are created by people who can both unite in criminal groups and act in a single way.
In recent years, cyber attacks have been growing with the help of cerebral programs. Unfortunately, this trend did not bypass Russia - here the number of such attacks in only 2021 increased by more than three (!) Times.
That is why by the way in the Russian translation Oleg Skustin, an outstanding expert, is released Only in Russian, but also in international digital forensics. The author talks about everything regarding the encryptions - from the history of attacks to digital evidence. In the midst of his story, fragments of the software code are quite natural, and in some places color screenshots.
according to the author (and this opinion is based on more than ten years of experience in the field of information security), the network and money of the enterprise can To protect, if you understand the life cycle of attacks of bending programs-this cycle is described in detail in the second chapter of the book, as well as in the last chapter, where the author helps readers learn to reconstruct the universal life cycle of attacks, which all the encryptions are subordinate, no matter how individual features they differ.
for students studying system administration, system and network administrators, as well as for response specialists and analysts of cyberosis.
| Characteristics | |
| A country | Russia |
| Author | Skulkin Oleg |
| Number of pages | 205 |
| The year of publishing | 2023 |
| Type of cover | Hard cover |
There are no reviews for this product.