Read more
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.
List of contents
Preface. About the Editor. List of Contributors. Acknowledgements. SECTION I: History of Ransomware Groups. Chapter 1: A Brief History of Ransomware. Chapter 2: A closer look at the famous Ransomware Groups. SECTION II: Ransomware in Healthcare. Chapter 3: Actor Behaviour, Notable Incidents in Critical Infrastructures and Risks to the Health Sector. Chapter 4: Ransomware: Impacts in Healthcare Critical infrastructure. Chapter 5: The Evolution of Ransomware in Healthcare Organizations. SECTION III: Ransomware Countermeasures. Chapter 6: Ransomware Threat Mitigation Techniques: Past, Present and Future. Chapter 7: Ransomware Threat Mitigation Strategies for Protecting Critical Infrastructure Assets. Chapter 8: Ransomware Prevention Strategies: Building Robust Cyber Defenses. SECTION IV: Human Factors and Futuristic Challenges. Chapter 9: Malicious Minds: Psychological Profiling of Ransomware Attackers and Policing Challenges. Chapter 10: The Human Firewall: Mitigating Ransomware Risks in Critical Infrastructures Through Human-Centric Approaches. Chapter 11: Space Systems and Malware: Potential Threats. Index.
About the author
Dr. Mohiuddin Ahmed is dedicated to educating the next generation of cyber leaders and conducting research to disrupt the cybercrime ecosystem. His research focuses on ensuring national security and safeguarding critical infrastructures from cyber terrorists. Dr. Ahmed has edited several books and contributed articles to The Conversation. He has secured several external and internal grants totaling more than $1.7 million and has collaborated with academia and industry. Dr. Ahmed is a regular speaker at international conferences and public organizations and is sought after by the media for his expert opinion. Additionally, he is a Fellow of the Higher Education Academy, UK. He is also a Senior Member of IEEE and was an ACM Distinguished Speaker. He is an Associate Editor for the International Journal of Computers and Applications and Journal of Cyber Security Technology.
Summary
This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.