cyberextortion


Also found in: Dictionary, Thesaurus, Legal.
Related to cyberextortion: Cyberstalking, Cyber terrorism

cyberextortion

A crime in which payment is demanded in order to prevent or stop attacks on an organization's website, network or computer systems. In 2004, a Carnegie Mellon survey stated that only one out of five cyberextortionists who threatened an attack and did not receive payment actually went through with it. See cybercrime.
Mentioned in ?
References in periodicals archive ?
Five years ago we were talking about lost laptops, lost backups and rogue employees," said Bantick, adding that now cyberextortion is fairly common.
Related forecasts included terrorists sending subliminal messages directly to the brain implants of potential recruits, cyberextortion by hacking into brain implants and scrambling or threatening to scramble information in it, and the problem of people with brain implants being unable to a separate virtual reality created by cyberoffenders in flesh-and-blood reality.
Because cybercrime is a business for some perpetrators, the policy can also cover the ransom demand and expenses associated with cyberextortion.
Four-color illustrations on every page diagram exactly how all aspects of security and security breaches work, from basics of the Internet through cyberextortion.
In the past few years, however, more insurers have begun to offer a range of policies that cover theft of data, loss from denial-of-service or other attacks, online fraud, and cyberextortion.
Cyberextortion at online gambling sites: criminal organization and legal challenges, John McMullan and Anshul Rege.
Coverage is available for cyberextortion, often as an add-on module to a cyber policy and sometimes as an enhancement to a kidnap and ransom policy.
Breach notification costs 91% Cyberextortion 80% Network/business interruption 80% Data recovery 75% Fines and penalties 75% Reputational harm 44% Professional liability 43% Theft of trade secrets 29% Source: RIMS Cyber Survey 2015 What will be your top cyberrisk spending categories in 2015?
Regardless of whether they have cyberextortion insurance coverage in their network risk policy, risk managers may want to take some measures before Bots do damage.
The types of problems that result include unauthorized use, data manipulation, Web hacking, spoofing, distributed denial of service (DDoS) attacks, viruses, and cyberextortion.
Cyberextortion is easy to execute and difficult to combat.