Defined term

Ransomware

Ransomware: Malware that holds the victim’s device (computer, phone, etc.) and data for ransom, by means of encrypt- ing the files on the device or preventing…

Verified
🏆 High Consensus
Cybersecurity

Definition

Malware that holds the victim’s device (computer, phone, etc.) and data for ransom, by means of encrypt- ing the files on the device or preventing access to the device. Election office computers should maintain high levels of cyber hygiene, including up-to-date anti- malware systems and adherence to best practices regarding managing browser and email client activities.

Alternative Definitions

Definition 2

Malware installed on a victim’s device that mounts either an extortion attack that holds the victim’s data hostage or threatens to publish the victim’s data until a ransom is paid.

Source: March 2020 CSC ReportType: external
Definition 3

Malware that holds the victim’s device (computer, phone, etc.) and data for ransom, by means of encrypting the files on the device or preventing access to the device. Election office computers should maintain high levels of cyber hygiene, including up-to-date anti- malware systems and adherence to best practices regarding managing browser and email client activities.

Source: EAC IT Glossary for Election OfficialsType: external
Definition 4

A form of malware used to extort money from the owners of infected computers. Typically, the perpetrator encrypts or deletes data on an infected computer and provides the code needed to recuperate the data only after a ransom has been paid.

Source: Information Assurance Situation in Switzerland and InternationallyType: external
Definition 5

A malware designed to deny a user or organization access to files on their computer

Source: NICCS GlossaryType: standard
Definition 6

Malicious software that denies the user access to their les, computer or device until a ransom is paid. (UK 2016)

Source: The Cyber GlossaryType: external

Sources

1
The State and Local Election Cybersecurity Playbook
View Source
2
March 2020 CSC Report
View Source
3
EAC IT Glossary for Election Officials
View Source
4
EAC Information Technology Terminology
View Source
5
Information Assurance Situation in Switzerland and Internationally
View Source
6
NICCS Glossary
View Source
7
The Cyber Glossary
View Source

Continue Research

Browse the full glossary for adjacent terms, or subscribe for updates when definitions and sources are expanded.