Ransomware: Hostage Situation
dc.contributor.author | Abedin, Khuram | |
dc.date.accessioned | 2018-07-24T16:44:05Z | |
dc.date.available | 2018-07-24T16:44:05Z | |
dc.date.issued | 2018 | |
dc.description.abstract | In this digitized world, data is accessible at the fingertips 24/7 and has improved the way people live and productivity and efficiency within organizations. However, security concerns have also taken a toll on reliability and sociability. Cyberattacks such as ransomware – malware, Trojans, phishing, spam, and viruses – cause organizations millions of dollars in damages and productivity loss. This annotated bibliography explores literature on the issues of malware and how to recover from and prevent disastrous attacks. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/23437 | |
dc.language.iso | en_US | en_US |
dc.publisher | University of Oregon | en_US |
dc.relation.ispartofseries | AIM Capstone;Abedin2018 | |
dc.rights | Creative Commons BY-NC-ND 4.0-US | en_US |
dc.subject | Ransomware | en_US |
dc.subject | Cybersecurity | en_US |
dc.subject | Bitcoins | en_US |
dc.subject | Malware | en_US |
dc.subject | Virus | en_US |
dc.subject | Cyberattack | en_US |
dc.subject | Corporate cyber-attacks | en_US |
dc.subject | Business cybercrime | en_US |
dc.subject | Trojan attacks | en_US |
dc.subject | Enterprise cybercrime | en_US |
dc.subject | Cyber worm | en_US |
dc.subject | Computer virus | en_US |
dc.subject | Backup encryption | en_US |
dc.subject | Ransomware amongst organizations | en_US |
dc.title | Ransomware: Hostage Situation | en_US |
dc.type | Terminal Project | en_US |