This type of malware encrypts files on a device, rendering them inaccessible. The attacker offers a decryption key in exchange for payment, but recovery is not guaranteed even after ransom demands are met.
Related Terms
Security Operations Center (SOC)
A Security Operations Center (SOC) is a centralized unit within an organization responsible for moni...
Sensitive Data
Information protected due to legal, ethical, privacy, financial, or other concerns. Examples include...