Ransomware Revolution: The Rise of a Prodigious Cyber Threat

Ryan, Matthew.

Ransomware Revolution: The Rise of a Prodigious Cyber Threat [electronic resource] / by Matthew Ryan. - 1st ed. 2021. - XV, 156 p. 36 illus., 17 illus. in color. online resource. - Advances in Information Security, 85 2512-2193 ; . - Advances in Information Security, 85 .

Introduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion.

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

9783030665838

10.1007/978-3-030-66583-8 doi


Cryptography.
Data encryption (Computer science).
Cooperating objects (Computer systems).
Risk management.
Computer networks--Security measures.
Cryptology.
Cyber-Physical Systems.
IT Risk Management.
Mobile and Network Security.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in