The Annotated Bibliography

Jade Ames Moore

ENGL 211C

Professor Susan McAlister

9 October 2023

Annotated Bibliography

While writing my research paper, I needed  some references to get me to my finish line. Finding these sources, especially peer reviewed, was challenging. Being able to find the best sources has taught me how to properly cover a research paper in what I can now add to my skills of education. With having to find five sources and two being scholarly, I will be giving the details of each source. Starting strong with a peer reviewed article called “ Ransomware deployment methods and analysis: views from a predictive model and human responses”  made by Gavin Hull, Henna John & Budi Arief. 

This peer reviewed article covers the human factors of Ransomware. The problem is how human factors can be the main cause of cybercrime. Cybercrime is ⅔ human activities and the technological impact just covers ⅓ . I also used this article to define what ransomware is. Using this peer reviewed article as a definition of what ransomware is really helped develop my paper. It also made me view what ransomware is with how many definitions are out now, this definition made the most sense. In the article they talk about how nowadays we need a better understanding of how ransomware is deployed, its characteristics, and how potential victims might react to ransomware incidents in order to combat ransomware mitigation on 18 families of ransomware, leading to a model for categorizing ransomware behavioral characteristics, which can then be used to improve detection and handling of ransomware incidents.  The model was developed The threat intelligence is derived from background knowledge of Windows APIs, commonly encountered ransomware traits, and intelligence regarding the evolving strategies of ransomware authors.

The second article used to get my point across my paper was “Malware” with no current author. As this being a non peer reviewed article, I believe I got a lot of usable information. I didn’t quote anything from this article. I mainly used it to further my understanding of malware. Even though I didn’t use direct quotes this article was a huge help with knowing the in-between of cybersecurity and how malware works. The problem of this article was how can you tell if you have a malware infection in your company or personal device. Who’s impacted in this article is anyone who understands what malware is and how to understand the threats that you may be a victim of malicious acts. Some efforts that have been effective to solve the main prob;em but failed are the detection of malware. While we have softwares to help us detect malwares, they haven’t made software to avoid these malicious bugs. All things have trial and error and having one of these developed softwares is the main thing. The most feasible solution is to 

The third article I’ll be reviewing today is my second peer review I used to complete my research paper  “Trends in Ransomware Attacks on Us Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021”. Using this in my paper covered why cybersecurity should be taught and provided by companies that utilize networks as their main communication/resource. When using this article I focused on healthcare and how to show awareness on how hospitals are one of the main targets of Ransomware. They Are shown to be the most vulnerable and able to give money upfront. The problem is How frequently do health care delivery organizations experience ransomware attacks, and how have the characteristics of ransomware attacks changed over time. The most impacted in this problem would be the patients of this ransomware. With their information being able to freely out to the public and the power of turning off machines with patients on life support. This can become a life to death matter in the long run. The most feasible solution to this situation is keeping softwares updated and a strong IT/Cyber Security team. 

My fourth citation I chose to review for my research paper is  “Downtime: The Real Cost Of Ransomware” by Delphix. I used this article to cover my research paper on my business downtime section. The business downtime is very underlooked and needs to have more awareness. Just paying the ransomware money is not the end, it’s just the beginning. The problem of this article is why paying up doesn’t always pay off. Whos the most impacted in this section would be head of the companies in their employers. The head of the companies losing profit, and hoping that their revenue won’t be affected because of this impact; and the employees that will miss hours or sometimes lay offs from their jobs because of the lack of business. Past efforts that have failed to resolve this situation are the Colonial Pipelines. They had to shut everything down to the fuel. The feasible solution to this prob;em was to take time to gather information and regroup. 

The last article i used to support my research paper was “How to Prevent Ransomware Attacks: Top 10 Best Practices in 2023 | UpGuard” by Kyle Chin. I used this article to support this essay as a whole. I took some information from this article to again understand more on ransomware and fact check. The problem with this article is facts on how to prevent ransomware. With this time of day dealing with the Russians and maybe soon with China, we need more people aware of sign and education of a potential cyber crime.  

Leave a Reply

Your email address will not be published. Required fields are marked *