1.5 Side stepping encryption

But why not avoid encryption altogether? There are other ways in which cyber criminals may run their extortion scheme. Ransomware in the future may just start deleting files at an exponential rate until the ransom is paid. In some cases, the threat of public disclosure is more potent: pay or else the files will be posted publicly. This works very well when the data is embarrassing, holds a high amount of valuable intellectual property, or is a valuable intelligence asset.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.41.214