Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Examples of Ransomware
Examples of Ransomware
About Ransomware
About Ransomware
About Ransomware
About Ransomware
About Ransomware
About Ransomware
Delivery
Delivery
Drive-By
Download
Malvertising
Botnet
Malicious App
Phone Home
Installation
Infection
Delivery
Disable Defenses
Support Services
Disable Defenses
Installation
Infection
Delivery
Demand Ransom
Release of Files
Support Services
Disable Defenses
Installation
Infection
Delivery
Demand Ransom
Pay Ransom
Release of Files
Support Services
Disable Defenses
Installation
Infection
Delivery
Demand Ransom
Pay Ransom
Recommendations
Network Defenses
Preparation
Back-ups follow 3 2 1
rule
Staff Training
User Training
Endpoint Defense-inDepth
Patch and Configuration
Management
Application Whitelisting
Data Encryption
Device Control
Antivirus
Post-Event
Configuration Restoration
Forensics
Infrastructure Changes
Recommendations
AV
Contr
ol the
Bad
Device Control
Control the Flow
Endpoint Defense-in-Depth
Successful risk mitigation starts
with a solid vulnerability
management foun- dation,
augmented by additional layered
defenses which go beyond the
traditional blacklist approach.
Application Control
Control the Gray
Recommendations
AV
Contr
ol the
Bad
Device Control
Control the Flow
Application Control
Control the Gray
Recommendations
AV
Contr
ol the
Bad
Device Control
Control the Flow
Application Whitelisting
Extremely effective against zeroday attacks
Stops unknown, targeted malware
payloads, regardless of delivery
mechanism
Low performance impact on
endpoints
Application Control
Control the Gray
Recommendations
AV
Contr
ol the
Bad
Device Control
Control the Flow
Data Encryption
Protects data in cases of theft or
accidental loss
Makes lateral data acquisition more
difficult for APTs
Required by almost all regulations
Application Control
Control the Gray
Recommendations
AV
Contr
ol the
Bad
Device Control
Control the Flow
Application Control
Control the Gray
Recommendations
AV
Contr
ol the
Bad
Device Control
Control the Flow
Antivirus
Stops background noise malware
May detect reused code and
evasion techniques
Will eventually clean payloads after
signatures are developed
Application Control
Control the Gray
Recommendations
Network Defenses
Preparation
Back-ups follow 3 2 1
rule
Staff Training
User Training
Endpoint Defense-inDepth
Patch and Config
Management
Application Whitelisting
Data Encryption
Device Control
Antivirus
Post-Event
Configuration Restoration
Forensics
Infrastructure Changes
Summary
Ransomware, cyber-extortion, digital
blackmail its evil and its here
Implement the security tech and
training ahead of time to minimize the
chances of your data being held for
ransom and to maximize your ability to
recover quickly
Have an Incident Response Plan in place