Digital Extortion

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
Note: Refer to Extortion.









(Source: Business Continuity Management Institute - BCM Institute)

 

2. Extortion cases are often difficult and harrowing for the victim. As investigators work furiously to validate claims made by the threat actor, the doomsday clock continues to tick. Often, victims are faced with the inevitable decision to give in, or not give in, to threat actor demands as the clock counts down. For this reason, we consider digital extortion as a lethal data breach scenario.
Source: (Verizon, 2016)