Scareware

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 192 Experts worldwide ranked by ideXlab platform

Gabor D Kelen - One of the best experts on this subject based on the ideXlab platform.

  • electronic mass casualty assessment and planning scenarios emcaps development and application of computer modeling to selected national planning scenarios for high consequence events
    Annals of Emergency Medicine, 2009
    Co-Authors: James J Scheulen, Meridith H Thanner, Christian K Latimer, Jeffrey Brown, Gabor D Kelen
    Abstract:

    Few tools exist that are sufficiently robust to allow manipulation of key input variables to produce casualty estimates resulting from high-consequence events reflecting local or specific regions of concern. This article describes the design and utility of a computerized modeling simulation tool, Electronic Mass Casualty Assessment and Planning Scenarios (EMCAPS), developed to have broad application across emergency management and public health fields as part of a catastrophic events preparedness planning process. As a scalable, flexible tool, EMCAPS is intended to support emergency preparedness planning efforts at multiple levels ranging from local health systems to regional and state public health departments to Metropolitan Medical Response System jurisdictions. Designed around the subset of the National Planning Scenarios with health effects, advanced by the US Department of Homeland Security, the tool's platform is supported by the detailed descriptions and readily retrievable evidence-based assumptions of each scenario. The EMCAPS program allows the user to manipulate key scenario-based input variables that would best reflect the region or locale of interest. Inputs include population density, vulnerabilities, event size, and potency, as applicable. Using these inputs, EMCAPS generates the anticipated population-based health surge influence of the hazard scenario. Casualty estimates are stratified by injury severity/types where appropriate. Outputs are graph and table tabulations of surge estimates. The data can then be used to assess and tailor response capabilities for specific jurisdictions, organizations, and health care systems. EMCAPS may be downloaded without cost from http://www.hopkins-cepar.org/EMCAPS/EMCAPS.html as shareware.

James J Scheulen - One of the best experts on this subject based on the ideXlab platform.

  • electronic mass casualty assessment and planning scenarios emcaps development and application of computer modeling to selected national planning scenarios for high consequence events
    Annals of Emergency Medicine, 2009
    Co-Authors: James J Scheulen, Meridith H Thanner, Christian K Latimer, Jeffrey Brown, Gabor D Kelen
    Abstract:

    Few tools exist that are sufficiently robust to allow manipulation of key input variables to produce casualty estimates resulting from high-consequence events reflecting local or specific regions of concern. This article describes the design and utility of a computerized modeling simulation tool, Electronic Mass Casualty Assessment and Planning Scenarios (EMCAPS), developed to have broad application across emergency management and public health fields as part of a catastrophic events preparedness planning process. As a scalable, flexible tool, EMCAPS is intended to support emergency preparedness planning efforts at multiple levels ranging from local health systems to regional and state public health departments to Metropolitan Medical Response System jurisdictions. Designed around the subset of the National Planning Scenarios with health effects, advanced by the US Department of Homeland Security, the tool's platform is supported by the detailed descriptions and readily retrievable evidence-based assumptions of each scenario. The EMCAPS program allows the user to manipulate key scenario-based input variables that would best reflect the region or locale of interest. Inputs include population density, vulnerabilities, event size, and potency, as applicable. Using these inputs, EMCAPS generates the anticipated population-based health surge influence of the hazard scenario. Casualty estimates are stratified by injury severity/types where appropriate. Outputs are graph and table tabulations of surge estimates. The data can then be used to assess and tailor response capabilities for specific jurisdictions, organizations, and health care systems. EMCAPS may be downloaded without cost from http://www.hopkins-cepar.org/EMCAPS/EMCAPS.html as shareware.

Wall D.s. - One of the best experts on this subject based on the ideXlab platform.

  • The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
    'Elsevier BV', 2020
    Co-Authors: Connolly, Lena Y., Wall D.s.
    Abstract:

    YesYear in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from Scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respond effectively to this form of threat. By drawing upon in-depth interviews with victims and law enforcement officers involved in twenty-six crypto-ransomware attacks between 2014 and 2018 and using an inductive content analysis method, we develop a data-driven taxonomy of crypto-ransomware countermeasures. The findings of the research indicate that responses to crypto-ransomware are made more complex by the nuanced relationship between the technical (malware which encrypts) and the human (social engineering which still instigates most infections) aspects of an attack. As a consequence, there is no simple technological ‘silver bullet’ that will wipe out the crypto-ransomware threat. Rather, a multi-layered approach is needed which consists of socio-technical measures, zealous front-line managers and active support from senior management.This work was supported by the Engineering and Physical Sciences Research Council and is part of the EMPHASIS (EconoMical, PsycHologicAl and Societal Impact of RanSomware) project [EP/P011721/1]

Tamara Dinev - One of the best experts on this subject based on the ideXlab platform.

  • is spyware an internet nuisance or public menace
    Communications of The ACM, 2005
    Co-Authors: Tamara Dinev
    Abstract:

    Recent media attention to spyware [2, 5, 7, 8] has brought to light the blunt intrusion into individual privacy and the uncertain hidden cost of free access to Internet sites, along with freeware and shareware. Most spyware programs belong to the more benign category of adware that delivers targeted pop-up ads based on a user's Web surfing habits. The more malicious type of spyware tracks each keystroke of the user and sends that information to its proprietors. Such information could be used for legitimate data mining purposes or it could be abused by others for identity theft and financial crimes.

Ds Wall - One of the best experts on this subject based on the ideXlab platform.

  • The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
    'Elsevier BV', 2019
    Co-Authors: Connolly Y L, Ds Wall
    Abstract:

    Year in and year out the increasing adaptivity of offenders has maintained ransomware's position as a major cybersecurity threat. The cybersecurity industry has responded with a similar degree of adaptiveness, but has focussed more upon technical (science) than ‘non-technical’ (social science) factors. This article explores empirically how organisations and investigators have reacted to the shift in the ransomware landscape from Scareware and locker attacks to the almost exclusive use of crypto-ransomware. We outline how, for various reasons, victims and investigators struggle to respond effectively to this form of threat. By drawing upon in-depth interviews with victims and law enforcement officers involved in twenty-six crypto-ransomware attacks between 2014 and 2018 and using an inductive content analysis method, we develop a data-driven taxonomy of crypto-ransomware countermeasures. The findings of the research indicate that responses to crypto-ransomware are made more complex by the nuanced relationship between the technical (malware which encrypts) and the human (social engineering which still instigates most infections) aspects of an attack. As a consequence, there is no simple technological ‘silver bullet’ that will wipe out the crypto-ransomware threat. Rather, a multi-layered approach is needed which consists of socio-technical measures, zealous front-line managers and active support from senior management