Exploring the weakness of our physical security, Who is capable of launching an attack on our critical infrastructure within our physical parameters or only cyberspace attack could occur in the worst case scenario. This research should focus on the methods of prevention, mitigation and recovery.
Product a 6-page research paper on Ransomware, including surveillance and recognizant methods to control this threat.
Research Paper Requirements:
Â· Provide at least 6 academic journal references to support your research