Fig. 12From: Ransomware deployment methods and analysis: views from a predictive model and human responsesRansomware entry methodBack to article page