Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyber Extortion

Handbook of Research on Information Security and Assurance
The webjacking activity that infects a computer with malicious code that encrypts user-based documents, then demands ransoms for a key that can be used to decipher them.
Published in Chapter:
Ransomware: A New Cyber Hijacking Threat to Enterprises
Xin Luo (The Univeristy of New Mexico, USA) and Qinyu Liao (The University of Texas at Brownsville, USA)
Copyright: © 2009 |Pages: 6
DOI: 10.4018/978-1-59904-855-0.ch001
Abstract
In computer virology, advanced encryption algorithms, on the bright side, can be utilized to effectively protect valuable information assets of enterprises. Yet, on the dark side, they can also be of use for malicious attackers to conduct pernicious activities. This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention from enterprises with regard to ransomware—a newly emerged cyber hackjacing threat using such encryption technology as RSA—and to help both academic researchers and IT practitioners understand the technological characteristics of ransomware, along with its severity analysis. As ransomware infections continue to rise, and attacks employing refined algorithm become increasingly sophisticated, data protection faces serious challenges. This chapter draws a ransomware extortion scheme, compares ransomware with other malware, and discusses future trends and research directions in an effort to cater to both practitioners and researchers.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cyber Risk: A Big Challenge in Developed and Emerging Markets
An attack, or threat of attack, against an enterprise, coupled with a demand for money to avert/stop the attack.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR