Mansfield-Devine, 2016 - Google Patents
Ransomware: taking businesses hostageMansfield-Devine, 2016
- Document ID
- 15392802842284309967
- Author
- Mansfield-Devine S
- Publication year
- Publication venue
- Network Security
External Links
Snippet
Cybercrime has its fashions. As technologies evolve and defences improve, so hackers and cyber-criminals modify their methods of attack. We're currently seeing a burgeoning in the use of ransomware, the digital form of blackmail in which your computer is effectively taken …
- 230000003935 attention 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mansfield-Devine | Ransomware: taking businesses hostage | |
| Muslim et al. | A study of ransomware attacks: Evolution and prevention | |
| Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
| Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
| Kaur et al. | Cybersecurity threats in FinTech | |
| Belmabrouk | Cyber criminals and data privacy measures | |
| Sarowa et al. | Analysis of attack patterns and cyber threats in healthcare sector | |
| DS et al. | A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants | |
| Bojarski | Dealer, hacker, lawyer, spy. Modern techniques and legal boundaries of counter-cybercrime operations | |
| Singh et al. | CYBERSECURITY AND DATA PRIVACY. | |
| Fanning | Minimizing the cost of malware | |
| Budke et al. | Physician practice cybersecurity threats: ransomware | |
| Jabid et al. | A brief history of ransomware | |
| Särökaari | Phishing attacks and mitigation tactics | |
| Bhattacharya et al. | Cyber literacy, awareness, and safety of senior citizens: A comprehensive case study of the contemporary landscape | |
| Hassan | Ransomware overview | |
| Iqbal et al. | Cybersecurity And Cybercrime Investigation | |
| Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
| Gordon et al. | Cybersecurity & the Courthouse: safeguarding the judicial process | |
| Betz | An analysis of the relationship between security information technology enhancements and computer security breaches and incidents | |
| Schell et al. | HOW US AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017. | |
| Lozada | Ransomware: analyzing the impact on healthcare and the economy | |
| Alexander | Examining the Efficacy of Defensive Strategies Designed to Prevent Ransomware in K-12 School Districts: A Case Study | |
| Elrom | Security and compliance | |
| Unger | Susceptibility and Response of Small Business to Cyberattacks |