Global Advanced Research Journal of Educational Research and Reviews Impact Factor (ISI): 0.1389

Global Advanced Research Journal of Educational Research and Reviews (ISSN: 2315-5132) Vol. 10(2) PP. 252-256, April 2023
Available online http://garj.org/garjerr
Copyright © 2023 Global Advanced Research Journals

Review

Mitigating Ransomware through Cybersecurity Law Enforcement

Philip Nnamdi Egbo

University Graduate School Bloomington, Cybersecurity Risk Management, Indiana University, Bloomington, U.S.A.

E-mail: egbophil@yahoo.com

Accepted 30 April 2023

Abstract

Cybersecurity is a hot topic in our present-day society because of the role it plays especially in this era of Internet of Things (IoT) where there is a rapid growth in the network of connected computing devices. The internet has made the world a global village by bringing various nations, businesses, governments, and people together. The Covid19 pandemic has also contributed to the huge dependence on the internet as most organizations in both the public and private sectors were forced to operate virtually to contain the spread of the pandemic. The dependence on the internet by several individuals, governments, companies including financial institutions and health care industries for daily business operations have created multiple avenues for cybercrime. Some of these cybercrimes have escalated to become national security issues because of their impact on critical infrastructures. Ransomware is a prevalent cybercrime that was predicted by the European Union Agency for Cybersecurity to rise to 150 percent between April 2020 and July 2021. Due to the challenges of enforcing laws across various borders and attribution amongst other issues have created difficulties in managing ransomware attacks and other forms of cybercrime. Ransomware perpetrators have progressed from incoherent splinter factions to a sophisticated operation. The aim of this paper is to focus on some of the cybersecurity law enforcements that can mitigate ransomware attacks.

Keywords: Cybersecurity and Law Enforcement 

References

Braue D (2022). Global Ransomware Damage Costs Predicted To Exceed $265 Billion By 2031. Cybercrime Magazine. https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/

Dixon VK (2009). Understanding the implications of a global village. Inquiries J. 1(11).

Dudley R, Golden D (2021). The Colonial Pipeline Ransomware Hackers Had a Secret Weapon: Self-Promoting Cybersecurity Firms. ProPublica. https://www.propublica.org/article/the-colonial-pipeline-ransomware-hackers-had-a-secret-weapon-self-promoting-cybersecurity-firms

Federal Bureau of Investigation (2022). Ransomware. Retrieved from https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/ransomware.

Federal Bureau of Investigation. “Internet Crime Report 2021”. https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

Fung B (2021). Colonial Pipeline says ransomware attack also led to personal information being stolen | CNN Business. CNN. https://www.cnn.com/2021/08/16/tech/colonial-pipeline-ransomware/index.html

Humayun M, Jhanjhi NZ, Alsayat A, Ponnusamy V (2021). Internet of things and ransomware: Evolution, mitigation, and prevention. Egyptian Informatics J. 22(1): 105-117.

Kerner SM (2022). Colonial Pipeline hack explained: Everything you need to know. WhatIs.com. https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-need-to-know

Kosseff J (2017). Defining cybersecurity law. Iowa L. Rev., 103: 985.

Li C (2018). A repeated call for omnibus federal cybersecurity law. Notre Dame L. Rev., 94: 2211.

Li S, Xu LD, Zhao S (2015). The internet of things: a survey. Inf Syst Front 17: 243–259. https://doi.org/10.1007/s10796-014-9492-7

Osborne C (2021). Ransomware in 2022: We're all screwed. ZDNET. https://www.zdnet.com/article/ransomware-in-2022-were-all-screwed/

Oz H, Aris A, Levi A, Uluagac AS (2022). A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Computing Surveys (CSUR), 54(11s): 1-37.

Petya Ransomware. (2018, February 15). https://www.cisa.gov/news-events/alerts/2017/07/01/petya-ransomware. 

Ransomware Security Software | Anchor. (n.d.). Anchor. https://anchormydata.com/ransomware/

Recent Ransomware Attacks. (n.d.). https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/recent-ransomware-attacks/.  

Richardson R, North MM (2017). Ransomware: Evolution, mitigation and prevention. Int.  Manage. Rev. 13(1): 10.

Roumani Y (2021). Patching zero-day vulnerabilities: an empirical analysis. J. Cybersecurity, 7(1): 023.

RTF Report: Combating Ransomware. (n.d.). Institute for Security and Technology. https://securityandtechnology.org/ransomwaretaskforce/report/

Saraie C (2022). Five ransomware attacks in 2022 so far you should know about. https://www.cshub.com/attacks/articles/five-ransomware-attacks-in-2022-so-far-you-should-know-about

Savage K, Coogan P, Lau H (2015). The evolution of ransomware. Symantec, Mountain View.

Schmitt MN, Vihul L (2017). Sovereignty in cyberspace: lex lata vel non?. Am. J. Int. Law. 111: 213-218.

Shackelford S (2014). Defining the Cyber Threat in Internet Governance. In Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace (pp. 3-51). Cambridge: Cambridge University Press. doi:10.1017/CBO9781139021838.004

The History of Ransomware? Understand | Prevent | Recover. (n.d.). Ransomware.org. https://ransomware.org/what-is-ransomware/the-history-of-ransomware/

Waldman A (2022). FBI: Ransomware hit 649 critical infrastructure entities in 2021 | TechTarget. Security. https://www.techtarget.com/searchsecurity/news/252515076/FBI-Ransomware-hit-649-critical-infrastructure-entities-in-2021