Quantitative and Qualitative Research on Ransomware Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Following the rise in the cases of ransomware attacks, it is crucial to approach the issues and find alternative solutions. Ransomware is computer software created to hinder computer users from accessing the computer system unless they pay a specific access fee (Yaqoob et al., 2017). A ransom is a fee paid to access the information back. Computer users get the links to such software from phished emails and unwarily open. Accessing the phished emails results in damage through loss of sensitive personal data and details, disruption of their regular programmes loss of finances paid to regain access to their computer systems. This report reviews the quantitative and qualitative characteristics of ransomware.

Methodology

The Delphi method, use of questionnaires reading journal articles and surveys, are used in the research to gain quality and reliable feedback. After collecting the data, the researcher reviewed using content analysis, where we looked into the scope of the data giving the information discussed below. The methods used in the collection and analysing the data were cheap and easily accessible in this case. Though the data collected is accurate, convincing the participants to participate in such a delicate topic was the only problem encountered. The explorer managed relevant information about the qualities of the ransomware and estimated their quantitative characteristics.

Study Findings and Results

The ransomware consists of unbreakable encryptions that the creators can only access. Unbreakable encryption creates a hard to answer puzzle for the computer owner, making them pay for the ransomware’s removal as the only reliable option. The computer owners fear and lack alternatives to accessing their systems. Removing the ransomware attack once the computer user opens the link is difficult because the virus contaminates the computer system. The virus encrypts all kinds of data and creates an impossibility to identify the areas and files affected by the hacking. Once the encryption occurs, the files’ names are interfered with, exaggerating the difficulty to trace the destroyed files. It creates instability in the thinking of the computer owner and leads to the payment of the ransom.

Additionally, the hackers display symbolic images and messages to inform the owner that they have to pay a ransom to access their files. The hackers send the photos and news to create panic in the computer owner, leading to unstable decisions (Hull, John & Arief, 2019). The ransom has a time limit by which innocent computer users should pay. Failing to pay the ransom extends the damage on the computer systems until the casualty makes the payment. The victimiser directs victims to make payments in the form of Bitcoins. Bitcoins are difficult to trace; thus no evidence about the creators of the ransomware. The creators of this computer software use ransomware to exploit computer users who are not cautious and sensitive in protecting their computers from such attacks.

In terms of quantity, ransomware attacks have led to losses of billions of money and affected a large magnitude of people, that is, millions of computer users throughout the world (Thomas, 2018). The victims undergo similar circumstances and fail to keep their accessories off the attacks. However, despite the challenges of detective measures to identify the sources of these attacks to protect computer users, people can take personal precautionary actions to protect their computers from external aggression and evade their losses. First, computer users should employ data backup systems in case such incidences occur, and they will have a better alternative than falling into the trap of paying the ransom. Second, they should upgrade their computer systems into the most recent ones. Updating to the latest systems ensure they are less exposed to ransomware compared to those using outdated ones. Lastly, they should use antivirus software to protect the computers from questionable sites and mails.

Conclusion

Ransomware causes discomfort among computer users and exploits them to pay an unnecessary amount of money to access their property. Victims experience moments of insecurity due to loss of personal data, losing money correcting the mess, and disrupting their schedules. Lack of systems to decrypt the computer systems without paying the wholesome has aided in the exploitation process and should be looked into by governmental and non-governmental agencies.

Reference

Hull, G., John, H., & Arief, B. (2019). Crime Science, 8(1), 1-22.

Thomas, J. (2018). Thomas, JE (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management, 12(3), 1-23.

Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., & Guizani, M. (2017). Computer Networks, 129, 444-458.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2023, February 21). Quantitative and Qualitative Research on Ransomware. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/

Work Cited

"Quantitative and Qualitative Research on Ransomware." IvyPanda, 21 Feb. 2023, ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.

References

IvyPanda. (2023) 'Quantitative and Qualitative Research on Ransomware'. 21 February.

References

IvyPanda. 2023. "Quantitative and Qualitative Research on Ransomware." February 21, 2023. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.

1. IvyPanda. "Quantitative and Qualitative Research on Ransomware." February 21, 2023. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.


Bibliography


IvyPanda. "Quantitative and Qualitative Research on Ransomware." February 21, 2023. https://ivypanda.com/essays/quantitative-and-qualitative-research-on-ransomware/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1