Ransomware Attack: Rescue-checklist Cyber Security Awareness Program
Article ID: 3162
DOI: https://doi.org/10.30564/aia.v3i1.3162
Abstract
Keywords
Full Text:

References
[1] Adhikari, D. 2016. Exploring the differences between social and behavioral science. Behavioral Development Bulletin, 21(2), 128–135.
[2] Wayne Patterson, Cynthia E. Winston-Proctor - Behavioral Cybersecurity_ Applications of Personality Psychology and Computer Science (2019, Taylor & Francis_CRC).
[3] Cuthbertson A. (2017): “Ransomware attacks rise 250 percent in 2017, Hitting U.S. Hardest,” Newsweek, September 28, 2017. www.newsweek.com/ransomware-attacks-rise-250-2017-us-wannacry-614034.
[4] C. Everett, “Ransomware: To pay or not to pay?", Comp. Fraud &
[5] Secur., vol. 2016, no. 4, pp. 8{12, 2016
[6] (doi: 10.1016/S1361-3723(16)30036-7).
[7] Young, H., van Vliet, T., van de Ven, J., Jol, S., Broekman, C.: Understanding human factors in cyber security as a dynamic system. In: International Conference on Applied Human Factors and Ergonomics, pp. 244–254. Springer, Cham (2018).
[8] Gavin Watson, Andrew Mason and Richard Ackroyd (Auth.) - Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense (2014, Syngress).
[9] Connolly LY, Lang M, Gathegi J, et al. Organizational culture, procedural countermeasures and employee security behaviour: a qualitative study. Inf Comp Secur 2017;25:118-36.
[10] Hull G, John H, Arief B. Ransomware deployment methods and analysis: views from a predictive model and human responses. Crime Science 2019;8:2-22.
[11] Internet Security Threat Report Volume 22 https://s1.q4cdn.com/585930769/files/doc_downloads/lifelock/ISTR22_Main-FINAL-APR24.pdf.
[12] C. Everett, Ransomware: To pay or not to pay?", Comp. Fraud &
[13] Secur., vol. 2016, no. 4, pp. 8{12, 2016
[14] (doi: 10.1016/S1361-3723(16)30036-7).
[15] “What you need to know about the WannaCry ransomware",
[16] Symantec, Threat Intelligence, Oct. 2017, [Online]. Available:
[17] https://www.symantec.com/blogs/threat-intelligence/wannacryransomware-attack.
[18] Wisniewska, M., Wisniewski, Z.: The relationship between knowledge security and the propagation of innovation. Adv. Intell. Syst. Comput. 783, 176–184 (2019).
[19] Hull G, John H, Arief B. Ransomware deployment methods and analysis: views from a predictive model and human responses. Crime Science 2019;8:2-22.
[20] Brewer R. Ransomware attack: detection, prevention and cure. Network Secur 2016;2016:5-9.
[21] Mohammed Daffalla Elradi, Altigani Abd alraheem Altigani,Osman Idriss Abaker. Cyber Security Awareness among Students and Faculty Members in a Sudanese College. Electrical Science &Engineering,Volume 02, Issue 02, October 2020.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.