+

Mansfield-Devine, 2016 - Google Patents

Ransomware: taking businesses hostage

Mansfield-Devine, 2016

Document ID
15392802842284309967
Author
Mansfield-Devine S
Publication year
Publication venue
Network Security

External Links

Snippet

Cybercrime has its fashions. As technologies evolve and defences improve, so hackers and cyber-criminals modify their methods of attack. We're currently seeing a burgeoning in the use of ransomware, the digital form of blackmail in which your computer is effectively taken …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Mansfield-Devine Ransomware: taking businesses hostage
Muslim et al. A study of ransomware attacks: Evolution and prevention
Popoola et al. Ransomware: Current trend, challenges, and research directions
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Kaur et al. Cybersecurity threats in FinTech
Belmabrouk Cyber criminals and data privacy measures
Sarowa et al. Analysis of attack patterns and cyber threats in healthcare sector
DS et al. A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants
Bojarski Dealer, hacker, lawyer, spy. Modern techniques and legal boundaries of counter-cybercrime operations
Singh et al. CYBERSECURITY AND DATA PRIVACY.
Fanning Minimizing the cost of malware
Budke et al. Physician practice cybersecurity threats: ransomware
Jabid et al. A brief history of ransomware
Särökaari Phishing attacks and mitigation tactics
Bhattacharya et al. Cyber literacy, awareness, and safety of senior citizens: A comprehensive case study of the contemporary landscape
Hassan Ransomware overview
Iqbal et al. Cybersecurity And Cybercrime Investigation
Narain Ransomware-rising menace to an unsuspecting cyber audience
Gordon et al. Cybersecurity & the Courthouse: safeguarding the judicial process
Betz An analysis of the relationship between security information technology enhancements and computer security breaches and incidents
Schell et al. HOW US AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017.
Lozada Ransomware: analyzing the impact on healthcare and the economy
Alexander Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study
Elrom Security and compliance
Unger Susceptibility and Response of Small Business to Cyberattacks
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载