Ransomware revolution : the rise of a prodigious cyber threat / Matthew Ryan.
2021
HV6773.15.C97 R93 2021
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Ransomware revolution : the rise of a prodigious cyber threat / Matthew Ryan.
Author
ISBN
9783030665838 (electronic bk.)
3030665836 (electronic bk.)
9783030665845 (print)
3030665844
9783030665852 (print)
3030665852
3030665828
9783030665821
3030665836 (electronic bk.)
9783030665845 (print)
3030665844
9783030665852 (print)
3030665852
3030665828
9783030665821
Published
Cham : Springer, [2021]
Language
English
Description
1 online resource : illustrations (some color)
Item Number
10.1007/978-3-030-66583-8 doi
Call Number
HV6773.15.C97 R93 2021
Dewey Decimal Classification
363.325
Summary
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ransomware revolution after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.
Bibliography, etc. Note
Includes bibliographical references.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 23, 2021).
Series
Advances in information security ; v. 85.
Available in Other Form
Print version: 9783030665821
Linked Resources
Record Appears in
Table of Contents
Introduction
Genesis of Ransomware
Evolution of Applied Cryptography
Ransomware Economics
Ransomware Case Studies
Dangerous Convergences
Auxiliary Impacts
Failed Translations
The Sociology of Ransomware
Conclusion.
Genesis of Ransomware
Evolution of Applied Cryptography
Ransomware Economics
Ransomware Case Studies
Dangerous Convergences
Auxiliary Impacts
Failed Translations
The Sociology of Ransomware
Conclusion.