The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Introduction to Ransomware
Abstract
Ransomware can lock users' information or resources (such as screens); hence, authorized users are blocked from retrieving their private data/assets. Ransomware enciphers the victim's plaintext data into ciphertext data; subsequently, the victim host can no longer decipher the ciphertext data to original plaintext data. To get back the plaintext data, the user will need the proper decryption key; therefore, the user needs to pay the ransom. In this chapter, the authors shed light on ransomware malware, concepts, elements, structure, and other aspects of ransomware utilization. Specifically, this chapter will extend the elaboration on the ransomware, the state-of-art ransomware, the ransomware lifecycle, the ransomware activation and encryption processes, the ransom request process, the payment and recovery, the ransomware types, recommendation for ransomware detection and prevention, and strategies for ransomware mitigation.
Related Content
Amdy Diene.
© 2024.
12 pages.
|
B. Sam Paul, A. Anuradha.
© 2024.
21 pages.
|
Muhsina, Zidan Kachhi.
© 2024.
15 pages.
|
Burak Tomak, Ayşe Yılmaz Virlan.
© 2024.
14 pages.
|
Allen Farina, Carolyn N. Stevenson.
© 2024.
25 pages.
|
Sadhana Mishra.
© 2024.
16 pages.
|
Catherine Hayes.
© 2024.
17 pages.
|
|
|