Patel et al., 2020 - Google Patents
A malicious activity monitoring mechanism to detect and prevent ransomwarePatel et al., 2020
View PDF- Document ID
- 13963193413674499029
- Author
- Patel A
- Tailor J
- Publication year
- Publication venue
- Computer Fraud & Security
External Links
Snippet
In this digital world, security is the primary concern for users concerned about unauthorised access to their computer systems. At the same time, ransomware–a tool used by cyber criminals to encrypt the contents of a computer's file system without the permission or …
- 230000000694 effects 0 title description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Patel et al. | A malicious activity monitoring mechanism to detect and prevent ransomware | |
Mos et al. | The growing influence of ransomware | |
Lee et al. | Ransomware prevention technique using key backup | |
Chowdhury | Recent cyber security attacks and their mitigation approaches–an overview | |
Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
Algarni | Cybersecurity attacks: Analysis of “wannacry” attack and proposing methods for reducing or preventing such attacks in future | |
Chittooparambil et al. | A review of ransomware families and detection methods | |
Mukherjee | Overview of the Importance of Corporate Security in business | |
Duong et al. | Working from home users at risk of COVID-19 ransomware attacks | |
Jain et al. | Cybersecurity solutions using AI techniques | |
Rehman et al. | A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks | |
Kumari et al. | Ransomware attack protection: A cryptographic approach | |
Sriram et al. | A hybrid protocol to secure the cloud from insider threats | |
Hussien | Cyber security crimes, ethics and a suggested algorithm to overcome cyber-physical systems problems (CybSec1) | |
Singh et al. | CYBERSECURITY AND DATA PRIVACY. | |
Senapati et al. | Impact of information leakage and conserving digital privacy | |
Jimada et al. | Analysis of ransomware, methodologies used by attackers and mitigation techniques | |
Hamad et al. | Survey on ransomware evolution, prevention, and mitigation | |
Hassan | Ransomware overview | |
CN112651023A (en) | Method for detecting and preventing malicious Lego software attacks | |
Al Faisal et al. | Growing digital vulnerability: A case study of threats to Pakistans national assets | |
Kaur | A secure and smart framework for preventing ransomware attack | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Purwawijaya et al. | The Significant Rise In Cybercrime Can Be Attributed To Vulnerabilities In Cybersecurity | |
Teymourlouei | Preventative Measures in Cyber & Ransomware Attacks for Home & Small Businesses' Data |