Ransomware: Recommendations against the extortion

Shubham Goel, John Bambenek, Masooda Bashir

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The dramatic rise in ransomware attacks in the last few years has made headlines all over the world. With the invention of new attack techniques, ransomware has become the most prolific and profitable type of cyber-attack of all time. In this paper, we provide the first comprehensive guide for organizations and individuals to protect against ransomware by analysing the differences, commonalities, and best practices among 49 reports that are widely available. Our research reveals that individuals and organizations should take both proactive and reactive approaches that take into account both pre-attack and post-attack strategies. In addition, we present protective measures that are specific to governments, corporations, and researchers/online communities/media while differentiating between technical and operational recommendations.

Original languageEnglish (US)
Title of host publicationProceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018
EditorsPedro Isaias, Miguel Baptista Nunes, Philip Powell, Luis Rodrigues
PublisherIADIS
Pages193-200
Number of pages8
ISBN (Print)9789898533746
StatePublished - 2018
Event11th IADIS International Conference Information Systems 2018, IS 2018 - Lisbon, Portugal
Duration: Apr 14 2018Apr 16 2018

Publication series

NameProceedings of the 11th IADIS International Conference Information Systems 2018, IS 2018

Other

Other11th IADIS International Conference Information Systems 2018, IS 2018
Country/TerritoryPortugal
CityLisbon
Period4/14/184/16/18

Keywords

  • CyberCrime
  • Malicious activities
  • Malware
  • Ransomware
  • Underground economy

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Ransomware: Recommendations against the extortion'. Together they form a unique fingerprint.

Cite this