Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
- This topic has 0 replies, 1 voice, and was last updated 3 years, 11 months ago by .
We are compiling a census of actual ransomware attacks, with the objective of detecting possible clues to attribution. A unique feature of this census is examining the dialog structure of each attack—-how the attack unfolded as a conversation between the attacker and the victim. We do not need to know the identity of the victim, but do have a list of questions that we would like to pursue in a phone conversation with individuals willing to share their experiences. These questions concern the participants in the unfolding attack (characteristics of the victim; type of system infected; point of entry; what is known about the attacker or attackers; payment method and destination; whether and how law enforcement was involved), as well as the time-sequenced series of utterances among the participants. The study will be completed by the end of 2017, and a summary report will be made available to those who have contributed their experience to the census. If you would like to participate, please contact us at firstname.lastname@example.org .
You must be logged in to reply to this topic.