Ransomware:
In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pr...
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
O'Reilly Media, Inc.
[2022]
|
Ausgabe: | [First edition]. |
Schriftenreihe: | Security superstream
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0636920702641/?ar |
Zusammenfassung: | In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video). |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed April 26, 2022) |
Umfang: | 1 Online-Ressource (1 video file (3 hr., 22 min.)) sound, color. |
Internformat
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-078669316 | ||
003 | DE-627-1 | ||
005 | 20240228121645.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 220609s2022 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)078669316 | ||
035 | |a (DE-599)KEP078669316 | ||
035 | |a (ORHE)0636920702641 | ||
035 | |a (DE-627-1)078669316 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 006.31 |2 23/eng/20220426 | |
245 | 1 | 0 | |a Ransomware |c Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b O'Reilly Media, Inc. |c [2022] | |
300 | |a 1 Online-Ressource (1 video file (3 hr., 22 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Security superstream | |
500 | |a Online resource; title from title details screen (O'Reilly, viewed April 26, 2022) | ||
520 | |a In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video). | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Malware (Computer software) | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Logiciels malveillants | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer security | |
650 | 4 | |a Malware (Computer software) | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
655 | 2 | |a Webcast | |
700 | 1 | |a Messdaghi, Chloé |e PräsentatorIn |4 pre | |
700 | 1 | |a Knight, Alissa |e PräsentatorIn |4 pre | |
700 | 1 | |a Brumfield, Cynthia |e PräsentatorIn |4 pre | |
700 | 1 | |a Conway, Edna |e PräsentatorIn |4 pre | |
700 | 1 | |a Ramsdell, Kellyn Wagner |e PräsentatorIn |4 pre | |
700 | 1 | |a Iacono, Laurie |e PräsentatorIn |4 pre | |
710 | 2 | |a O'Reilly (Firm), |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0636920702641/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-078669316 |
---|---|
_version_ | 1821494944050708480 |
adam_text | |
any_adam_object | |
author_corporate | O'Reilly (Firm) |
author_corporate_role | ctb |
author_facet | O'Reilly (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)078669316 (DE-599)KEP078669316 (ORHE)0636920702641 |
dewey-full | 006.31 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.31 |
dewey-search | 006.31 |
dewey-sort | 16.31 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03859cgm a22006612 4500</leader><controlfield tag="001">ZDB-30-ORH-078669316</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121645.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220609s2022 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078669316</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP078669316</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0636920702641</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078669316</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.31</subfield><subfield code="2">23/eng/20220426</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ransomware</subfield><subfield code="c">Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">O'Reilly Media, Inc.</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (3 hr., 22 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Security superstream</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed April 26, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels malveillants</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="655" ind1=" " ind2="2"><subfield code="a">Webcast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Messdaghi, Chloé</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Knight, Alissa</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brumfield, Cynthia</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Conway, Edna</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramsdell, Kellyn Wagner</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Iacono, Laurie</subfield><subfield code="e">PräsentatorIn</subfield><subfield code="4">pre</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0636920702641/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
genre | Webcast |
genre_facet | Webcast |
id | ZDB-30-ORH-078669316 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:25Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (3 hr., 22 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | O'Reilly Media, Inc. |
record_format | marc |
series2 | Security superstream |
spelling | Ransomware Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono [First edition]. [Place of publication not identified] O'Reilly Media, Inc. [2022] 1 Online-Ressource (1 video file (3 hr., 22 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Security superstream Online resource; title from title details screen (O'Reilly, viewed April 26, 2022) In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video). Computer security Computer crimes Prevention Malware (Computer software) Computer Security Sécurité informatique Logiciels malveillants Computer crimes ; Prevention Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet Webcast Messdaghi, Chloé PräsentatorIn pre Knight, Alissa PräsentatorIn pre Brumfield, Cynthia PräsentatorIn pre Conway, Edna PräsentatorIn pre Ramsdell, Kellyn Wagner PräsentatorIn pre Iacono, Laurie PräsentatorIn pre O'Reilly (Firm), MitwirkendeR ctb |
spellingShingle | Ransomware Computer security Computer crimes Prevention Malware (Computer software) Computer Security Sécurité informatique Logiciels malveillants Computer crimes ; Prevention Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet |
title | Ransomware |
title_auth | Ransomware |
title_exact_search | Ransomware |
title_full | Ransomware Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono |
title_fullStr | Ransomware Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono |
title_full_unstemmed | Ransomware Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono |
title_short | Ransomware |
title_sort | ransomware |
topic | Computer security Computer crimes Prevention Malware (Computer software) Computer Security Sécurité informatique Logiciels malveillants Computer crimes ; Prevention Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Computer crimes Prevention Malware (Computer software) Computer Security Sécurité informatique Logiciels malveillants Computer crimes ; Prevention Instructional films Internet videos Nonfiction films Films de formation Films autres que de fiction Vidéos sur Internet Webcast |
work_keys_str_mv | AT messdaghichloe ransomware AT knightalissa ransomware AT brumfieldcynthia ransomware AT conwayedna ransomware AT ramsdellkellynwagner ransomware AT iaconolaurie ransomware AT oreillyfirm ransomware |