Ransomware Life Cycle And How To Combat It

Grin Verlag
SKU:
9783668888555
|
ISBN13:
9783668888555
$36.50
(No reviews yet)
Condition:
New
Usually Ships in 24hrs
Current Stock:
Estimated Delivery by: | Fastest delivery by:
Adding to cart… The item has been added
Buy ebook
Document from the year 2017 in the subject Computer Science - Internet, New Technologies, grade: B, Anglia Ruskin University, language: English, abstract: Ransomware is a dangerous malware which causes high financial loses for organizations. It is usually installed using a type of privilage esclation attack and then it encrypts data, asking for a ransom. In this paper, we will analyze ransomware life cycle and answer the question how to arrange your information security defences to combat ransomware outbreak. Information is an important asset for individuals, organisations, and governments. Stealing confidential information such as credit card numbers or Intellectual properties can cause financial loss or reputation damage. For example, Organisations invest in research creating intellectual property to secure their future earnings and pursue innovation. Because of that, Rao & Nayak (2014) state that intellectual property is valuable assets that need to be protected from theft or unauthorised access as it will cost mainly a severe financial loss. Chai, et al. (2016) state that individuals might be subjected to electronic bullying and harassments through internet social media like Facebook and Twitter. Most of the cases, protecting customer's information is protected by law which means that the theft of customer's sensitive information such as personal identifiable information (PII) and protected health information (PHI) will cause organisations to pay fines that consider also as a financial loss and reputation damage. In Healthcare industry, unauthorised modification on medical records can cause human life losses. Hammondl (2013) states that effective information security addresses the security triad (Confidentiality, Integrity & Availability). Confidentiality grantees that sensitive information (e.g. PHI, PII, Credit card, etc.) accessed by those who have the authority to access them. On the other hand, Integrity is making sure that data is protected against unaut


  • | Author: Haitham Ismail
  • | Publisher: Grin Verlag
  • | Publication Date: Mar 18, 2019
  • | Number of Pages: 24 pages
  • | Language: English
  • | Binding: Paperback
  • | ISBN-10: 3668888558
  • | ISBN-13: 9783668888555
Author:
Haitham Ismail
Publisher:
Grin Verlag
Publication Date:
Mar 18, 2019
Number of pages:
24 pages
Language:
English
Binding:
Paperback
ISBN-10:
3668888558
ISBN-13:
9783668888555