Luo et al., 2007 - Google Patents
Awareness education as the key to ransomware preventionLuo et al., 2007
View PDF- Document ID
- 18190893070554802239
- Author
- Luo X
- Liao Q
- Publication year
- Publication venue
- Information Systems Security
External Links
Snippet
Luo and Liao 196 a certain amount of pharmaceutical drugs from the attacker's designated online pharmacy stores. This article is the first attempt to address ransomware in information systems security research. In an effort to cater to both security practitioners and researchers …
- 230000002265 prevention 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Luo et al. | Awareness education as the key to ransomware prevention | |
Richardson et al. | Ransomware: Evolution, mitigation and prevention | |
Kara et al. | The rise of ransomware: Forensic analysis for windows based ransomware attacks | |
Liska et al. | Ransomware: Defending against digital extortion | |
Nadir et al. | Contemporary cybercrime: A taxonomy of ransomware threats & mitigation techniques | |
Lee et al. | Ransomware prevention technique using key backup | |
Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
Kalaimannan et al. | Influences on ransomware’s evolution and predictions for the future challenges | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Badve et al. | Reviewing the security features in contemporary security policies and models for multiple platforms | |
Nayak et al. | Review of ransomware attacks and a data recovery framework using autopsy digital forensics platform | |
Ko et al. | Trends in mobile ransomware and incident response from a digital forensics perspective | |
Jimada et al. | Analysis of ransomware, methodologies used by attackers and mitigation techniques | |
Fanning | Minimizing the cost of malware | |
Hamad et al. | Survey on ransomware evolution, prevention, and mitigation | |
Jabid et al. | A brief history of ransomware | |
Bidgoli | Integrating Real Life Cases Into A Security System: Seven Checklists For Managers. | |
Pathak | Cybercrime: A global threat to cybercommunity | |
Hassan | Ransomware overview | |
Yadav et al. | Malware techniques and its effect: A survey | |
Agrawal et al. | Cyber Risks and Security—A Case Study on Analysis of Malware | |
Mishra et al. | Identity theft, malware, and social engineering in dealing with cybercrime | |
Corrigan | Ransomware: a growing epidemic for business | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Prentosito et al. | Case study on a session hijacking attack: The 2021 cvs health data breach |