Ransomware Attacks: Annotated Bibliography

Added on -2020-02-19

| 4 pages| 782 words| 255 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 2 of 4 pages

1ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHYName of the StudentName of the UniversityAuthor Note
2ANNOTATED BIBLIOGRAPHYPortfolio 1Article 1: “Brewer, R. (2016). Ransomware attacks: detection, prevention and cure.NetworkSecurity,2016(9), 5-9.”The author provides a detailed explanation of the attack of the ransom attack takinginto consideration that the attack had become one of the biggest scams over the cyber whichdirectly hits the business prospective. Its main attribute is that it denies the access withregards to an individual to the organisations vital information and the affect is that it demandsfor some type of payment to lift the restriction applied on the task. The methodology used inthis aspect is bringing into account the different scenarios which are related the ransomattack.Article 2: “Crane, A., & Matten, D. (2016).Business ethics: Managing corporatecitizenship and sustainability in the age of globalization. Oxford University Press.”The author provides a detailed explanation of the business ethics concept that inplaying vital role in the real world. The concept that is followed by the author is directly onemphasizing with the practical problem and the real life example and its differentillustrations. The concept of the ethics is seen in everyday in the media. The media plays avital role in such a concept of approach.Article 3: “Sharma, A., & Misra, P. K. (2017). Aspects of Enhancing Security in SoftwareDevelopment Life Cycle.Advances in Computational Sciences and Technology,10(2), 203-210.”In the everyday life software’s are playing a very vital role. Software’s should beintegrated with the concept of security which would directly involve in the trust related aspect

Found this document preview useful?

You are reading a preview
Upload your documents to download
Become a Desklib member to get accesss



Q&A Library Access

Chat support


Document Unlocks


Answer Unlocks

Students who viewed this