- Добавил: literator
- Дата: 8-11-2024, 03:51
- Комментариев: 0
Название: Ransomware Evolution
Автор: Mohiuddin Ahmed
Издательство: CRC Press
Год: 2025
Страниц: 251
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB
Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they have stored. Typically, victims are required to pay a ransom, usually using cryptocurrency such as Bitcoin, to regain access. Ransomware attacks pose a significant threat to national security, and there has been a substantial increase in such attacks in the post-Covid era. In response to these threats, large enterprises have begun implementing better cybersecurity practices, such as deploying data loss prevention mechanisms and improving backup strategies. However, cybercriminals have developed a hybrid variant called Ransomware 2.0. In this variation, sensitive data is stolen before being encrypted, allowing cybercriminals to publicly release the information if the ransom is not paid. This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.
Автор: Mohiuddin Ahmed
Издательство: CRC Press
Год: 2025
Страниц: 251
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB
Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they have stored. Typically, victims are required to pay a ransom, usually using cryptocurrency such as Bitcoin, to regain access. Ransomware attacks pose a significant threat to national security, and there has been a substantial increase in such attacks in the post-Covid era. In response to these threats, large enterprises have begun implementing better cybersecurity practices, such as deploying data loss prevention mechanisms and improving backup strategies. However, cybercriminals have developed a hybrid variant called Ransomware 2.0. In this variation, sensitive data is stolen before being encrypted, allowing cybercriminals to publicly release the information if the ransom is not paid. This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.