You are here: Home Contents V15 N1 V15N1_Daigle.html
Personal tools

Ransomware and Its Implications: A Report



Full text

Journal of Information Systems Security
Volume 15, Number 1 (2019)
Pages 6173
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
James Daigle — Duke University, USA
Information Institute Publishing, Washington DC, USA




The practice of demanding a ransom in exchange for the release of a person or an item has been part of the human experience dating at least as far back as Julius Caesar, who was captured by pirates who then demanded a payment of twenty talents for his release (Plutarch). Although Caesar was eventually released, not all ransom demands in history resulted in the safe return of the captured, or even the payment to the captors. With the advent of computers and the digitalization of data and assets, it was inevitable that ransom demands would find their way into the digital landscape in the form of ransomware. A portmanteau of the words ransom and malware, ransomware is a form of malware that, when it has been deployed, will encrypt data on a computer and demand a ransom for the key to unencrypt the data. The purpose of the paper is to explore ransomware and its global implications, not only on local and global economies, but also on industrial firms and what, if anything, can be done to protect ourselves from future attacks.




Ransomware, Malware, Encrypt Data, Cryptocurrency, Protection from Attacks




AIDS Trojan or PC Cyborg Ransomware. Retrieved from URL:

Cooper, C. (May, 2018). WannaCry: Lessons Learned 1 Year Later. Retrieved from URL:

Fazzini, K. (May, 2019). Microsoft’s security chief explains why the company is eliminating passwords. Retrieved from URL:

Fig. 1 Retrieved from URL:

Fig. 2 Retrieved from URL:

Fig. 3 Retrieved from URL:

Fitz-Gerald, S. (July, 2013). Virus Coaxes Man to Turn Himself in for Child Pornography. Retrieved from URL:

Fromby, D., Durbha, S., and Beyah, R. (2017). Out of Control: Ransomware for Industrial Control Systems. Retrieved from URL:

Fruhlinger, J. (October, 2017). Petya ransomware and NotPetya malware: What you need to know now. Retrieved from URL:

Greenberg, A. (August. 2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Retrieved from URL:

Greenberg, A. (March, 2019). A Guide to LockerGoga, the Ransomware Crippling Industrial Firms. Retrieved from URL:

Jones, S. and Bradshaw, T. (May, 2017). Global Alert to Prepare For Fresh Cyber Attacks. Retrieved from URL:

Khaitan, R. (May, 2017). The 10 Countries Suffering Most From WannaCry Malware Attack. Retrieved from URL:

McGuire, M, (April, 2018). The Web of Profit: Understanding the Growth of the Cybercrime Economy. [PDF file]. Retrieved from URL:

Mello Jr., J. (February, 2017). Security Awareness Training Explosion. Retrieved from URL:

Morgan, S. (October, 2017). Cybercrime Damages $6 Trillion by 2021. Retrieved from URL:

Nakashima, E. and Timberg, C. (May, 2017). NSA officials worried about the day its potent hacking tool would get loose. Then it did. Retrieved from URL:

Nash, K., Castellanos, S., and Janofsky, A. (June, 2018). One Year after NotPetya Cyberattack, Firms Wrestle with Recovery Costs. Retrieved from URL:

Newman, L. H. (March, 2018). The Leaked NAS Spy Tool That Hacked the World. Retrieved from URL:

Palmer, D. (October, 2018). This is how much the WannaCry ransomware attack cost the NHS. Retrieved from URL:

Plutarch (1919). The Parallel Lives: The Life of Julius Caesar. Retrieved from URL:*.html

Richardson, R. and North, M. (January, 2017). Ransomware: Evolution, Mitigation and Prevention. Retrieved from URL:

Workman, M. (December, 2007). Gaining Access with Social Engineering: An Empirical Study of the Threat. Retrieved from URL:

Zetter, K. (January, 2015). A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever. Retrieved from URL: