Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Ransomware

Modern Theories and Practices for Cyber Ethics and Security Compliance
It is a sort of malware that includes an aggressor attacking individual's PC framework.
Published in Chapter:
Taxonomy of Login Attacks in Web Applications and Their Security Techniques Using Behavioral Biometrics
Rizwan Ur Rahman (Maulana Azad National Institute of Technology, Bhopal, India) and Deepak Singh Tomar (Maulana Azad National Institute of Technology, Bhopal, India)
DOI: 10.4018/978-1-7998-3149-5.ch008
Abstract
Research into web application security is still in its initial phase. In spite of enhancements in web application development, large numbers of security issues remain unresolved. Login attacks are the most malevolent threats to the web application. Authentication is the method of confirming the stated identity of a user. Conventional authentication systems suffer from a weakness that can compromise the defense of the system. An example of such vulnerabilities is login attack. An attacker may exploit a pre-saved password or an authentication credential to log into web applications. An added problem with current authentication systems is that the authentication process is done only at the start of a session. Once the user is authenticated in the web application, the user's identity is assumed to remain the same during the lifetime of the session. This chapter examines the level login attacks that could be a threat to websites. The chapter provides a review of vulnerabilities, threats of login attacks associated with websites, and effective measures to counter them.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Enhancing Cybersecurity Protocols in Modern Healthcare Systems: Strategies and Best Practices
A type of malicious software designed to block access to a computer system or data, usually by encrypting it, until a sum of money is paid. In healthcare, ransomware attacks can be particularly devastating as they can lock out critical patient data and disrupt healthcare services.
Full Text Chapter Download: US $37.50 Add to Cart
Using Deep Learning and Big Data Analytics for Managing Cyber-Attacks
It is a type of malware where ransom money is demanded after the system is being infiltrated/locked by the attacker. Some simple ransomwares may lock the machine without harming any files on the system whereas more powerful virus uses crypto viral extortion where user’s data is encrypted, and ransom amount is demanded to decrypt.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Apps Threats
Ransomware is a type of malware that severely restricts access to a computer, device or file until the user pays a ransom (Kaspersky Securelist, 2015 AU21: The in-text citation "Kaspersky Securelist, 2015" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).
Full Text Chapter Download: US $37.50 Add to Cart
Case Study Analysis: Cybersecurity Breach at Metropolitan Health Systems
Electronic form of ransom. Cyber criminals install malware on a network server and steal electronic data. They require money paid to them to release the electronic data.
Full Text Chapter Download: US $37.50 Add to Cart
Government's Dynamic Approach to Addressing Challenges of Cybersecurity in South Africa
Is the use of malicious software to encrypt a user’s data and then extort money to unencrypt it.
Full Text Chapter Download: US $37.50 Add to Cart
Ransomware: A New Cyber Hijacking Threat to Enterprises
A piece of pernicious software that exploits a user’s computer vulnerabilities to enter the user’s computer and encrypt all his/her files, and the attacker keeps the files locked unless the victim agrees to pay a ransom.
Full Text Chapter Download: US $37.50 Add to Cart
Intelligent Systems in Diverse Domains: Digital Transformation
is a cyberattack that aims to block and encrypt the systems, and then request a payment to give the decryption key for the victim, but this is not trusted all the time.
Full Text Chapter Download: US $37.50 Add to Cart
Ransomware: The Cyber Extortionist
A type of malware that tries to extort money from its victims by hijacking the victim’s computer in some way and holding it to ransom.
Full Text Chapter Download: US $37.50 Add to Cart
Developments and Defenses of Malicious Code
This is a piece of pernicious software that exploits a user’s computer vulnerabilities to sneak into the victim’s computer and encrypt all files until the victim agrees to pay a ransom.
Full Text Chapter Download: US $37.50 Add to Cart
The Advancing Cybersecurity Ecosystem of Israel: An Overview of Current Challenges and Opportunities in the Early 2020s
Blackmail (ransomware) is malicious software designed to “take hostage” in some way the data stored on users' IT devices, which it makes available again only upon payment of a ransom.
Full Text Chapter Download: US $37.50 Add to Cart
Malware Detection in Industrial Scenarios Using Machine Learning and Deep Learning Techniques
A type of malware that blocks access to computer data, generally using a cipher algorithm, and ask for a ransom.
Full Text Chapter Download: US $37.50 Add to Cart
Developing the Social, Political, Economic, and Criminological Awareness of Cybersecurity Experts: A Proposal and Discussion of Non-Technical Topics for Inclusion in Cybersecurity Education
A type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Threat Ransomware and Marketing to Networked Consumers
A kind of malicious software, it encrypts all the files on target machine, take control of it remotely and demands for virtual money to be paid as a ransomware.
Full Text Chapter Download: US $37.50 Add to Cart
Threats and Vulnerabilities of Mobile Applications
A type of malware that can deny the accessibility of the system until the ransom is paid.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR