Author: W. Curtis Preston

  • Author: W. Curtis Preston

Security Awareness Training Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Security awareness training platforms help organizations educate employees about cybersecurity threats through training modules and simulated attacks,

Read More

Commercial Password Management Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a tool that should be there, leave a comment! These tools provide centralized password storage and management solutions for organizations, helping ensure strong,

Read More

Ransomware Glossary (L)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Lateral Movement – Technique attackers use to move from one compromised system to other systems within a network. LDAP (Lightweight Directory Access Protocol) – Protocol for accessing and managing directory information services over

Read More

Ransomware Glossary (A)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Acceptable Use Policy – A policy that defines how an organization’s devices and systems can and cannot be used by employees. ACLs (Access Control Lists) – Network security rules that control which traffic

Read More

Ransomware Glossary (Z)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Zero-Day Exploit – Attack leveraging previously unknown vulnerability before developers can create a patch. Zero-day Vulnerability – Previously unknown security vulnerability that has no available patch or fix.Zero-Trust – Security model assuming no

Read More

Ransomware Glossary (X)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. XDR (Extended Detection and Response) – Advanced security platform that correlates data across multiple security layers (endpoints, networks, cloud) for improved threat detection.

Read More

Ransomware Glossary (W)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Wall of Shame – Website maintained by ransomware groups publicly listing victims who haven’t paid ransoms, or dark web leak sites where ransomware gangs publish stolen data from victims who don’t pay. WannaCry

Read More

Ransomware Glossary (V)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Virtual Local Area Network (VLAN) – Logical network segmentation that groups devices regardless of physical location. Virtual Machine (VM) – Software-based computer running within a hypervisor, allowing complete isolation and snapshot capabilities valuable

Read More

Ransomware Glossary (U)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. UBA (User Behavior Analytics) – Security monitoring that establishes baseline behavior patterns and alerts on anomalies indicating potential compromise. UEBA (User and Entity Behavioral Analytics) – Security analytics identifying abnormal user or system

Read More

Ransomware Glossary (T)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Tabletop Exercise – Discussion-based simulation where teams walk through incident response scenarios to test plans and coordination. Tabletop Exercise (TTX) – Discussion-based simulation where participants walk through incident scenarios to test response procedures.

Read More