Decoding Ransomware: Crafting a Comprehensive Taxonomy and Actionable Insights for Risk Mitigation

  • Swati Goyal
  • Himanshi nshi Capstone Project by Cohort 6 of the National Cyber Security Scholar Program

Abstract

This research addresses the critical gap in understanding and classifying ransomware by developing a comprehensive system that aligns with the evolving and complex landscape of ransomware threats. The research highlights the limitations of existing classification models, emphasising the need for a standardised framework that categorises ransomware based on its infection methods, propagation mechanisms, and sector-specific impact. By analysing extensive data from diverse ransomware families, this study identifies patterns and trends that inform the creation of a more effective classification system. The findings reveal that industries with high-value data, such as finance, manufacturing, critical infrastructure, and healthcare, face significant ransomware risks, leading to financial losses, operational disruptions, and regulatory challenges. This study provides organisations across sectors with critical insights to enhance their risk management and mitigation strategies. Beyond cybersecurity, the research underscores the need for stronger resilience measures, contributing to a broader discourse on digital security and operational continuity in an increasingly interconnected world. Ultimately, this classification framework serves as a valuable resource for policymakers, security professionals, and industry leaders, strengthening cybersecurity defences and response strategies against the growing ransomware threat.

References

1. Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, Abdulkadir SJ. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics. 2022 Jan 10;11(2):198. https://www.mdpi.com/2079-9292/11/2/198
2. Abid, Y. A., Wu, J., Farhan, M., & Ahmad, T. (2023). ECMT Framework for Internet of Things: an integrative approach employing In-Memory attribute examination and sophisticated neural network architectures in conjunction with hybridised machine learning methodologies. IEEE Internet of Things Journal, 11(4), 5867–5886. https://doi.org/10.1109/jiot.2023.3312152
3. Adebukola, A. A., Navya, A. N., Jordan, F. J., Jenifer, N. J., & Begley, R. D. (2022). Cyber security as a threat to health care. Journal of Technology and Systems, 4(1), 32–64. https://doi.org/10.47941/jts.1149
4. Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance Issues and Practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6
Published
2025-08-18
How to Cite
GOYAL, Swati; NSHI, Himanshi. Decoding Ransomware: Crafting a Comprehensive Taxonomy and Actionable Insights for Risk Mitigation. Journal of Advanced Research in Electronics Engineering and Technology, [S.l.], v. 12, n. 1&2, p. 1-11, aug. 2025. ISSN 2456-1428. Available at: <http://thejournalshouse.com/index.php/electronics-engg-technology-adr/article/view/1622>. Date accessed: 28 aug. 2025.