Legal Issues of Data Held Hostage

Error message

  • Warning: Cannot modify header information - headers already sent by (output started at /home/infosecw/public_html/index.php:3) in drupal_send_headers() (line 1475 of /home/infosecw/public_html/includes/bootstrap.inc).
  • Warning: Cannot modify header information - headers already sent by (output started at /home/infosecw/public_html/index.php:3) in drupal_send_headers() (line 1475 of /home/infosecw/public_html/includes/bootstrap.inc).
  • Warning: Cannot modify header information - headers already sent by (output started at /home/infosecw/public_html/index.php:3) in drupal_send_headers() (line 1475 of /home/infosecw/public_html/includes/bootstrap.inc).
  • User warning: The following module is missing from the file system: file_entity. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1128 of /home/infosecw/public_html/includes/bootstrap.inc).
  • Warning: Cannot modify header information - headers already sent by (output started at /home/infosecw/public_html/index.php:3) in drupal_send_headers() (line 1475 of /home/infosecw/public_html/includes/bootstrap.inc).
  • Warning: Cannot modify header information - headers already sent by (output started at /home/infosecw/public_html/index.php:3) in drupal_send_headers() (line 1475 of /home/infosecw/public_html/includes/bootstrap.inc).
  • Warning: Cannot modify header information - headers already sent by (output started at /home/infosecw/public_html/index.php:3) in drupal_send_headers() (line 1475 of /home/infosecw/public_html/includes/bootstrap.inc).

Contributed by Robert Underwood

Data held hostage has become a recent technology trend with computers and with these types of attacks in which crooks take a victim’s data and hold it for ransom demanding money to release our data back to us, which seems to be clearly a violation in law but how do we prosecute these criminals and what can we do to prevent these types of attack. A similar attack vector used like ransomware restricts a victim’s access to their computer functionality by popups and annoying spawning programs in which money is leveraged from the victim to stop the attack.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet