Author: W. Curtis Preston

  • Author: W. Curtis Preston

Ransomware Glossary (I)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. IAB (Initial Access Broker) – Cybercriminals who specialize in gaining initial access to networks and selling that access to ransomware operators. IaaS (Infrastructure as a Service) – Cloud computing service providing virtualized computing

Read More

Ransomware Glossary (H)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Hardware Security Module (HSM) – A physical device that safeguards and manages cryptographic keys and performs encryption operations. Hash Values – Unique digital fingerprints (like SHA256) used to verify file integrity and prove

Read More

Ransomware Glossary (G)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. GDPR (General Data Protection Regulation) – European Union privacy regulation requiring breach notifications within 72 hours and imposing strict data protection requirements. Geo-blocking – Security technique that restricts network access based on geographic

Read More

Ransomware Glossary (F)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Fail-back – The process of returning operations from a recovery environment back to the primary production environment. Fail-over – The process of switching operations from a compromised primary environment to a recovery environment.

Read More

Ransomware Glossary (E)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Eamfo – Specialized malware designed to steal credentials from Veeam backup software to enable data exfiltration through backup systems. EDR (Endpoint Detection and Response) – Security software that monitors endpoints for suspicious behavior

Read More

Ransomware Glossary (D)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. Dark Web – Encrypted networks (like Tor) accessible only through specialized software, often used for illicit activities including selling stolen data and hosting ransomware leak sites. DarkOwl – A threat intelligence platform that

Read More

Ransomware Glossary (C)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. C2 (Command and Control) Servers – External servers controlled by attackers that communicate with malware to send commands and receive stolen data. Capacity Metrics – Measurements of a backup system’s storage, throughput, and

Read More

Ransomware Glossary (B)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. B Backdoor – Hidden methods attackers use to maintain access to compromised systems even after initial vulnerabilities are patched. Backup – A copy of data stored separately from the original that can be

Read More

Learning Ransomware Response & Recovery

Get your copy today from O’Reilly, Amazon.com, or Audible. A Different Approach to Ransomware Most cybersecurity books tell you how to prevent ransomware. We assume you will likely get it. Learning Ransomware Response & Recovery takes a radically practical approach: assume breach and prepare for recovery. While prevention matters, the reality facing CISOs, IT leaders,

Read More

Ransomware Glossary (1-9)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book. 3-2-1 Rule – A fundamental backup principle: maintain at least three versions of your data on two different types of media, with one copy stored off-site or in a separate location.

Read More