16Ransomware: Threats, Identification and Prevention
Sweta Thakur, Sangita Chaudhari* and Bharti Joshi
Department of Computer Engineering, Ramrao Adik Institute of Technology,
D. Y. Patil Deemed to be University, Nerul, Navi Mumbai, India
*Corresponding author: sangita.chaudhari@rait.ac.in
Abstract
Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment. Ransomware is a way of stealing money in which a user’s files are encrypted and the decryption key is held by the attacker until a ransom amount is paid by the victim. Organizations need to have a full inventory of all the devices that are connected to the network and protect with an updated security solution. It is mandatory to study ransomware and its strategies to protect your computer system from being infected. Various types of ransomware attacks along with their features are studied by highlighting the major methodology used in the launching of ransomware attacks. Also, the comparative analysis of various ransomwares, detection mechanisms as well as prevention policies against ransomware attacks are summarized.
Keywords: Ransomware, malware, locker ransomware, crypto ransomware, MAC ransomware, ransomware lifecycle, ransomware traits
16.1 Introduction
For decades, Ransomware has attracted great attention of cybersecurity experts due to the fast growth in its attack periphery and creation of lots of new variants capable ...
Get Cyber Security and Digital Forensics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.