000 | 03926nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-030-66583-8 | ||
003 | DE-He213 | ||
005 | 20240423125001.0 | ||
007 | cr nn 008mamaa | ||
008 | 210224s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030665838 _9978-3-030-66583-8 |
||
024 | 7 |
_a10.1007/978-3-030-66583-8 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
100 | 1 |
_aRyan, Matthew. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aRansomware Revolution: The Rise of a Prodigious Cyber Threat _h[electronic resource] / _cby Matthew Ryan. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXV, 156 p. 36 illus., 17 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x2512-2193 ; _v85 |
|
505 | 0 | _aIntroduction -- Genesis of Ransomware -- Evolution of Applied Cryptography -- Ransomware Economics -- Ransomware Case Studies -- Dangerous Convergences -- Auxiliary Impacts -- Failed Translations -- The Sociology of Ransomware -- Conclusion. | |
520 | _aThis book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference. | ||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aRisk management. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aIT Risk Management. |
650 | 2 | 4 | _aMobile and Network Security. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030665821 |
776 | 0 | 8 |
_iPrinted edition: _z9783030665845 |
776 | 0 | 8 |
_iPrinted edition: _z9783030665852 |
830 | 0 |
_aAdvances in Information Security, _x2512-2193 ; _v85 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-66583-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c172915 _d172915 |