Teer, Kuck & Kruck (2007) notes that ransomware perpetrators are able to victimize the internet users and organizations by hijacking the files stored, ecrypting them before demanding payment in exchange for the decryption key. The threat functions by exploring the system vulnerabilities and seizing control over the victim’s file and computer systems until the demanded payment is made. I the last two years alone, sveral organizations and businesses have been confronted with significant proliferation of their IT resources from the cyberspace. Eperts and scholars have agreed that there is to come up with the best preventive mechanisms that will be key in mitigating the threat and the impacts that it has on the operations of the victim organization.
Sahzad, Safiq & Liu (2012) also informs that there is also the need to carry out awareness initiatives to help raise the profile of the problem for business to be cognizant of the threats that they currently face in the cyberspace. Wth the growing threats posed by ransomware on the IT system security, tere is need to explore the features the malware to address the security challenge that organizations face.
Een if the current trends of attack fade in the near future, tere is the possibility that the same modus operandi that is driven by same or even different perpetrators will take place at later times. It is for this reason why it is necessary to carry out this research to explore the risks and the threats ransomware poses to businesses and individuals. Tis research will help in increasing awareness on ransomware by offering a scientific perspective of the and also identifying the opportunities for coordination and collaboration so that it can be effectively mitigated.
Alodi, Sim, &Massacci (2012) defines ransomware to be a type of online fraud in which the perpetrators and attackers extort money by deploying malicious software. Te deployed software will automatically disable the functionality of the computer belonging to the victim and instead make it display a message demanding the payment of a given amount of money through a specified mode of payment. Te amount of money demanded may be very high making it for the victim to regain access to the files.
Acording to Dumitras & Efstathopoulos (2012) the perpetrators do not only target...
Please type your essay title, choose your document type, enter your email and we send you essay samples