[go: up one dir, main page]

Luo et al., 2007 - Google Patents

Awareness education as the key to ransomware prevention

Luo et al., 2007

View PDF
Document ID
18190893070554802239
Author
Luo X
Liao Q
Publication year
Publication venue
Information Systems Security

External Links

Snippet

Luo and Liao 196 a certain amount of pharmaceutical drugs from the attacker's designated online pharmacy stores. This article is the first attempt to address ransomware in information systems security research. In an effort to cater to both security practitioners and researchers …
Continue reading at www.unm.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Luo et al. Awareness education as the key to ransomware prevention
Richardson et al. Ransomware: Evolution, mitigation and prevention
Kara et al. The rise of ransomware: Forensic analysis for windows based ransomware attacks
Liska et al. Ransomware: Defending against digital extortion
Nadir et al. Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques
Lee et al. Ransomware prevention technique using key backup
Popoola et al. Ransomware: Current trend, challenges, and research directions
Kalaimannan et al. Influences on ransomware’s evolution and predictions for the future challenges
Wilner et al. On the social science of ransomware: Technology, security, and society
Badve et al. Reviewing the security features in contemporary security policies and models for multiple platforms
Nayak et al. Review of ransomware attacks and a data recovery framework using autopsy digital forensics platform
Ko et al. Trends in mobile ransomware and incident response from a digital forensics perspective
Jimada et al. Analysis of ransomware, methodologies used by attackers and mitigation techniques
Fanning Minimizing the cost of malware
Hamad et al. Survey on ransomware evolution, prevention, and mitigation
Jabid et al. A brief history of ransomware
Bidgoli Integrating Real Life Cases Into A Security System: Seven Checklists For Managers.
Pathak Cybercrime: A global threat to cybercommunity
Hassan Ransomware overview
Yadav et al. Malware techniques and its effect: A survey
Agrawal et al. Cyber Risks and Security—A Case Study on Analysis of Malware
Mishra et al. Identity theft, malware, and social engineering in dealing with cybercrime
Corrigan Ransomware: a growing epidemic for business
Narain Ransomware-rising menace to an unsuspecting cyber audience
Prentosito et al. Case study on a session hijacking attack: The 2021 cvs health data breach