comparison of cyber extortion and ransomware