Corpus ID: 1835087

The Emergence of Ransomware

  title={The Emergence of Ransomware},
  author={B. Giri and Babu},
  • B. Giri, Babu
  • Published 2006
  • Computer crimes in one way or another have modeled themselves on biological organisms (such as viruses and worms) or on real-life actions or incidents (Trojan horses) to carry out their tasks. Some of these methods have been used consistently and improved upon over time and others have languished, only to return when their potential was rediscovered. We define “ransomware” as a Trojan that encrypts or holds a computer or system resources—files, data, etc.—in its control for a ransom (commercial… CONTINUE READING
    6 Citations
    A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks
    • 55
    • PDF
    Survey on Ransomware: A New Era of Cyber Attack
    • 9
    Ransomware prevention technique using key backup
    • 7
    Ransomware: Studying transfer and mitigation
    • 15
    • Highly Influenced


    Cryptovirology: extortion-based security threats and countermeasures
    • A. Young, M. Yung
    • Computer Science
    • Proceedings 1996 IEEE Symposium on Security and Privacy
    • 1996
    • 168
    • PDF
    Modeling Botnet Propagation Using Time Zones
    • 401
    • PDF
    Beware of ransomware, firm warns
    • CNET,
    • 2006
    Internet browsers and cyber-crime
    • McAfee Inc.,
    • 2006
    Malware in Popular Networks,
    • Proceedings of the 15th virus bulletin international conference,
    • 2005
    Organized Crime and CyberCrime: Implications for Business,
    • Global issues electronic journal of U.S. Dept. of State on Arresting Transactional Crime,
    • 2001