Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Assessing The Frequency And Severity Of Malware Attacks: An Exploratory Analysis Of The Advisen Cyber Loss Dataset, Ahmed M. Abdelmagid, Farshid Javadnejad, C. Ariel Pinto, Michael K. Mcshane, Rafael Diaz, Elijah Gartell
Assessing The Frequency And Severity Of Malware Attacks: An Exploratory Analysis Of The Advisen Cyber Loss Dataset, Ahmed M. Abdelmagid, Farshid Javadnejad, C. Ariel Pinto, Michael K. Mcshane, Rafael Diaz, Elijah Gartell
Modeling, Simulation and Visualization Student Capstone Conference
In today's business landscape, cyberattacks present a significant threat that can lead to severe financial losses and damage to a company's reputation. To mitigate this risk, it is essential for stakeholders to have an understanding of the latest types and patterns of cyberattacks. The primary objective of this research is to provide this knowledge by utilizing the Advisen cyber loss dataset, which comprises over 137,000 cyber incidents that occurred across various industry sectors from 2013 to 2020. By using text mining techniques, this paper will conduct an exploratory data analysis to identify the most common types of malware, including ransomware. …
Cybersecurity Legislation And Ransomware Attacks In The United States, 2015-2019, Joseph Skertic
Cybersecurity Legislation And Ransomware Attacks In The United States, 2015-2019, Joseph Skertic
Graduate Program in International Studies Theses & Dissertations
Ransomware has rapidly emerged as a cyber threat which costs the global economy billions of dollars a year. Since 2015, ransomware criminals have increasingly targeted state and local government institutions. These institutions provide critical infrastructure – e.g., emergency services, water, and tax collection – yet they often operate using outdated technology due to limited budgets. This vulnerability makes state and local institutions prime targets for ransomware attacks. Many states have begun to realize the growing threat from ransomware and other cyber threats and have responded through legislative action. When and how is this legislation effective in preventing ransomware attacks? This …