Figure 4.
This Figure 4 shows a modelling of a ransomware event and how our common inventory of SCP-based cybersecurity controls can be applied to prevent ransomware.

Applying common inventory using ISO controls to control ransomware. For brevity, we use the ‘ISO number’ notation to depict ISO/IEC 27002 clauses. Adapted from: Ho et al. [16].

Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close