000 03926nam a22006015i 4500
001 978-3-030-66583-8
003 DE-He213
005 20240423125001.0
007 cr nn 008mamaa
008 210224s2021 sz | s |||| 0|eng d
020 _a9783030665838
_9978-3-030-66583-8
024 7 _a10.1007/978-3-030-66583-8
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
100 1 _aRyan, Matthew.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aRansomware Revolution: The Rise of a Prodigious Cyber Threat
_h[electronic resource] /
_cby Matthew Ryan.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXV, 156 p. 36 illus., 17 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v85
505 0 _aIntroduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion.
520 _aThis book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aCooperating objects (Computer systems).
650 0 _aRisk management.
650 0 _aComputer networks
_xSecurity measures.
650 1 4 _aCryptology.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aIT Risk Management.
650 2 4 _aMobile and Network Security.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030665821
776 0 8 _iPrinted edition:
_z9783030665845
776 0 8 _iPrinted edition:
_z9783030665852
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v85
856 4 0 _uhttps://doi.org/10.1007/978-3-030-66583-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c172915
_d172915