[go: up one dir, main page]

Patel et al., 2020 - Google Patents

A malicious activity monitoring mechanism to detect and prevent ransomware

Patel et al., 2020

View PDF
Document ID
13963193413674499029
Author
Patel A
Tailor J
Publication year
Publication venue
Computer Fraud & Security

External Links

Snippet

In this digital world, security is the primary concern for users concerned about unauthorised access to their computer systems. At the same time, ransomware–a tool used by cyber criminals to encrypt the contents of a computer's file system without the permission or …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Patel et al. A malicious activity monitoring mechanism to detect and prevent ransomware
Mos et al. The growing influence of ransomware
Lee et al. Ransomware prevention technique using key backup
Chowdhury Recent cyber security attacks and their mitigation approaches–an overview
Popoola et al. Ransomware: Current trend, challenges, and research directions
Algarni Cybersecurity attacks: Analysis of “wannacry” attack and proposing methods for reducing or preventing such attacks in future
Chittooparambil et al. A review of ransomware families and detection methods
Mukherjee Overview of the Importance of Corporate Security in business
Duong et al. Working from home users at risk of COVID-19 ransomware attacks
Jain et al. Cybersecurity solutions using AI techniques
Rehman et al. A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks
Kumari et al. Ransomware attack protection: A cryptographic approach
Sriram et al. A hybrid protocol to secure the cloud from insider threats
Hussien Cyber security crimes, ethics and a suggested algorithm to overcome cyber-physical systems problems (CybSec1)
Singh et al. CYBERSECURITY AND DATA PRIVACY.
Senapati et al. Impact of information leakage and conserving digital privacy
Jimada et al. Analysis of ransomware, methodologies used by attackers and mitigation techniques
Hamad et al. Survey on ransomware evolution, prevention, and mitigation
Hassan Ransomware overview
CN112651023A (en) Method for detecting and preventing malicious Lego software attacks
Al Faisal et al. Growing digital vulnerability: A case study of threats to Pakistans national assets
Kaur A secure and smart framework for preventing ransomware attack
Narain Ransomware-rising menace to an unsuspecting cyber audience
Purwawijaya et al. The Significant Rise In Cybercrime Can Be Attributed To Vulnerabilities In Cybersecurity
Teymourlouei Preventative Measures in Cyber & Ransomware Attacks for Home & Small Businesses' Data