Cargando…

The ransomware dilemma : the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack /

Ransomware has become a global scourge, as gangs of cybercriminals use malware to encrypt victims' data and extort payment as a condition of restoring access. The majority of business leaders who fall prey to the tactic are unprepared for the scenario and wind up paying the ransom. The authors...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Leo, Philipp (Autor), Isik, Öykü (Autor), Muhly, Fabian (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : MIT Sloan Management Review, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1331409888
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220621s2022 xx ob 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCF  |d OCLCQ  |d OCLCO 
024 8 |a 53863MIT63419 
029 1 |a AU@  |b 000072142002 
035 |a (OCoLC)1331409888 
037 |a 53863MIT63419  |b O'Reilly Media 
050 4 |a QA76.76.C68 
082 0 4 |a 005.8/8  |2 23/eng/20220621 
049 |a UAMI 
100 1 |a Leo, Philipp,  |e author. 
245 1 4 |a The ransomware dilemma :  |b the decision on whether to pay up when cybercriminals hold data hostage is shaped by choices leaders made long before an attack /  |c Philipp Leo, Öykü Isik, Fabian Muhly. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b MIT Sloan Management Review,  |c [2022] 
300 |a 1 online resource (5 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "Reprint 63419." 
504 |a Includes bibliographical references. 
520 |a Ransomware has become a global scourge, as gangs of cybercriminals use malware to encrypt victims' data and extort payment as a condition of restoring access. The majority of business leaders who fall prey to the tactic are unprepared for the scenario and wind up paying the ransom. The authors suggest a more considered approach to that decision and walk readers through six questions that can illuminate their options and inform their choices. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 0 |a Malware (Computer software) 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels malveillants. 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Malware (Computer software)  |2 fast 
700 1 |a Isik, Öykü,  |e author. 
700 1 |a Muhly, Fabian,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/53863MIT63419/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP