logo

Extortion Hack: Types, Effects and Prevention Methods

   

Added on  2023-06-04

9 Pages1842 Words92 Views
Running Head: EXTORTION HACK
EXTORTION HACK
Name of the student:
Name of the university:
Author note:
Extortion Hack: Types, Effects and Prevention Methods_1
2EXTORTION HACK
Executive Summary:
Extortion hacks are performed on organisation where money in form of bitcoin is demanded.
There are various types of extortion hacks like database extortion, distributed denial of service
extortion and so on. This report will broadly discuss these topics. The report will also enlighten
on the effects of extortion hacks on organisation and the methods that should be undertaken to
prevent cyber security attacks.
Extortion Hack: Types, Effects and Prevention Methods_2
3EXTORTION HACK
Table of Contents
Introduction......................................................................................................................................4
Discussion........................................................................................................................................4
Types of Extortion Hack..............................................................................................................4
Effect of Extortion Hack..............................................................................................................5
Methods to combat Cyber extortion............................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................9
Extortion Hack: Types, Effects and Prevention Methods_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
DDOS and Ransomware - Desklib
|4
|739
|285

Biggest ransomware outbreak in history hits nearly 100 countries with data held for ransom
|4
|1390
|366

Article Review of Denial of Service Attack Assignment
|4
|688
|137

IT Security Management
|12
|2958
|324

Cyber Crime: WannaCry Attack on NHS
|10
|2252
|2

Malware Research Analysis 2022
|6
|1205
|19