Ransomware: Hostage Situation

dc.contributor.authorAbedin, Khuram
dc.date.accessioned2018-07-24T16:44:05Z
dc.date.available2018-07-24T16:44:05Z
dc.date.issued2018
dc.description.abstractIn this digitized world, data is accessible at the fingertips 24/7 and has improved the way people live and productivity and efficiency within organizations. However, security concerns have also taken a toll on reliability and sociability. Cyberattacks such as ransomware – malware, Trojans, phishing, spam, and viruses – cause organizations millions of dollars in damages and productivity loss. This annotated bibliography explores literature on the issues of malware and how to recover from and prevent disastrous attacks.en_US
dc.identifier.urihttps://hdl.handle.net/1794/23437
dc.language.isoen_USen_US
dc.publisherUniversity of Oregonen_US
dc.relation.ispartofseriesAIM Capstone;Abedin2018
dc.rightsCreative Commons BY-NC-ND 4.0-USen_US
dc.subjectRansomwareen_US
dc.subjectCybersecurityen_US
dc.subjectBitcoinsen_US
dc.subjectMalwareen_US
dc.subjectVirusen_US
dc.subjectCyberattacken_US
dc.subjectCorporate cyber-attacksen_US
dc.subjectBusiness cybercrimeen_US
dc.subjectTrojan attacksen_US
dc.subjectEnterprise cybercrimeen_US
dc.subjectCyber wormen_US
dc.subjectComputer virusen_US
dc.subjectBackup encryptionen_US
dc.subjectRansomware amongst organizationsen_US
dc.titleRansomware: Hostage Situationen_US
dc.typeTerminal Projecten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Abedin_2018.pdf
Size:
1022.14 KB
Format:
Adobe Portable Document Format
Description:
50 pages
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.23 KB
Format:
Item-specific license agreed upon to submission
Description: