This culminating experience project conducted a Systematic Literature Review of ransomware in the healthcare industry. Due to COVID-19, there has been an increase in ransomware attacks that took healthcare by surprise. Although ransomware is a common attack, the current healthcare infrastructure and security mechanisms could not suppress these attacks. This project identifies peer-viewed literature to answer these research questions: “What current ransomware attacks are used in healthcare systems? “What ransomware attacks are likely to appear in the future?” and “What solutions or methods have been used to prepare, prevent, and recover from these attacks?” The purpose of this research is to identify a possible increasing trend of seeing ran...
When designing and implementing a new system, one of the most common misuse cases a system administr...
Despite the breakthroughs in machine learning, most classifiers are not robust against adversarial a...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it h...
Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersec...
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizatio...
With healthcare moving to the cloud, it is necessary to be concerned about the rising cyber-threats....
In the present world, everyone uses the Internet and to access the internet they would need to use a...
This document presents findings related to faculty and staff member’s ability to identify malware th...
With online learning becoming in high demand to deliver training and education during the COVID-19 p...
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. O...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for t...
Cases of ransomware within local government agencies have become prevalent over the last decade. Whi...
Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware...
When designing and implementing a new system, one of the most common misuse cases a system administr...
Despite the breakthroughs in machine learning, most classifiers are not robust against adversarial a...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...
With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it h...
Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersec...
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizatio...
With healthcare moving to the cloud, it is necessary to be concerned about the rising cyber-threats....
In the present world, everyone uses the Internet and to access the internet they would need to use a...
This document presents findings related to faculty and staff member’s ability to identify malware th...
With online learning becoming in high demand to deliver training and education during the COVID-19 p...
Traditionally, real-time communication, such as voice calls, has run on separate, closed networks. O...
In order to support air traffic control services, the U.S. Federal Aviation Administration (FAA) has...
Cyberattacks are a major problem for public organizations across the nation, and unfortunately for t...
Cases of ransomware within local government agencies have become prevalent over the last decade. Whi...
Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware...
When designing and implementing a new system, one of the most common misuse cases a system administr...
Despite the breakthroughs in machine learning, most classifiers are not robust against adversarial a...
Security attacks are becoming more prevalent as cyber attackers exploit system vulnerabilities for f...