Ask a question from expert

Ask now

Ransomware Attacks: Annotated Bibliography

4 Pages782 Words255 Views
   

Added on  2020-02-19

Ransomware Attacks: Annotated Bibliography

   Added on 2020-02-19

BookmarkShareRelated Documents
1ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHYName of the StudentName of the UniversityAuthor Note
Ransomware Attacks: Annotated Bibliography_1
2ANNOTATED BIBLIOGRAPHYPortfolio 1Article 1: “Brewer, R. (2016). Ransomware attacks: detection, prevention and cure.NetworkSecurity,2016(9), 5-9.”The author provides a detailed explanation of the attack of the ransom attack takinginto consideration that the attack had become one of the biggest scams over the cyber whichdirectly hits the business prospective. Its main attribute is that it denies the access withregards to an individual to the organisations vital information and the affect is that it demandsfor some type of payment to lift the restriction applied on the task. The methodology used inthis aspect is bringing into account the different scenarios which are related the ransomattack.Article 2: “Crane, A., & Matten, D. (2016).Business ethics: Managing corporatecitizenship and sustainability in the age of globalization. Oxford University Press.”The author provides a detailed explanation of the business ethics concept that inplaying vital role in the real world. The concept that is followed by the author is directly onemphasizing with the practical problem and the real life example and its differentillustrations. The concept of the ethics is seen in everyday in the media. The media plays avital role in such a concept of approach.Article 3: “Sharma, A., & Misra, P. K. (2017). Aspects of Enhancing Security in SoftwareDevelopment Life Cycle.Advances in Computational Sciences and Technology,10(2), 203-210.”In the everyday life software’s are playing a very vital role. Software’s should beintegrated with the concept of security which would directly involve in the trust related aspect
Ransomware Attacks: Annotated Bibliography_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Annotated Bibliography On Network And Information Security Technologies
|8
|1781
|39

Security Assessment in Software Development
|8
|1820
|209

Information Security Risk Case Study
|6
|916
|175

Cyber Threats: Understanding the Various Forms of Cyber-Attacks
|11
|2898
|479

IT Security : Assignment
|18
|4569
|32

Developing Cyber Resilience in Abacus Property Group: Findings and Analysis
|16
|4022
|372