2020
DOI: 10.9770/jesi.2020.8.2(47)
|View full text |Cite
|
Sign up to set email alerts
|

The social and legislative principles of counteracting ransomware crime

Abstract: This article aims to analyze the relationship between the threat of ransomware and new effective counteraction principles for law enforcement agencies to utilize. Moreover, it contemplates on how specific behavior of persons can help reduce the threat of being infected with this malicious software. It establishes that certain changes made in society's mentality towards their computer and network systems can significantly reduce the consequent damages of ransomware attacks. The manuscript uses a qualitative res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(2 citation statements)
references
References 64 publications
0
2
0
Order By: Relevance
“…This approach is beneficial in identifying ransomware that may evade traditional signature-based detection methods [21,41]. By analyzing patterns of file access, modification, and network activity, behavioral analysis can provide early warnings of ransomware activity [6,42,19]. Alongside these detection methods, research has also emphasized the importance of developing robust backup strategies and comprehensive disaster recovery plans [7,1,4].…”
Section: Impact On Businesses and Organizationsmentioning
confidence: 99%
“…This approach is beneficial in identifying ransomware that may evade traditional signature-based detection methods [21,41]. By analyzing patterns of file access, modification, and network activity, behavioral analysis can provide early warnings of ransomware activity [6,42,19]. Alongside these detection methods, research has also emphasized the importance of developing robust backup strategies and comprehensive disaster recovery plans [7,1,4].…”
Section: Impact On Businesses and Organizationsmentioning
confidence: 99%
“…Polymorphic and metamorphic ransomware showcase their advanced capabilities to elude detection by altering their code signatures or rewriting their codes, presenting a pressing challenge for cybersecurity defenses [6]. The global threat environment sees ransomware as a persistent risk across various sectors, driven by the lucrative prospects it offers to cybercriminals [7]. There remains an essential need for dynamic defense strategies that incorporate advanced detection and mitigation * Contact tools to navigate the complexities of ransomware threats [8].…”
Section: Introductionmentioning
confidence: 99%