Revolutionizing Education with AI: Recent Developments and Future Directions
EOI: 10.11242/viva-tech.01.05.001
Citation
Chandani Patel,Akhil Pillai,"Ransomware", VIVA-IJRI Volume 1, Issue 7, Article 1, pp. 1-7, 2024. Published by Master of Computer Application Department, VIVA Institute of Technology, Virar, India.
Abstract
Doxware,Extortionware,Infection,Teslacrypt,WannaCry
References
- Askarifar, S., Rahman, N. A. A., & Osman, H. (2018). A review of latest wannacry ransomware: Actions and preventions. J. Eng. Sci. Technol, 13, 24-33.
- Fernando, D. W., Komninos, N., & Chen, T. (2020). A study on the evolution of ransomware detection using machine learning and deep learning techniques. IoT, 1(2), 551-604.
- Kapoor, A., Gupta, A., Gupta, R., Tanwar, S., Sharma, G., & Davidson, I. E. (2021). Ransomware detection, avoidance,and mitigation scheme: a review and future directions. Sustainability, 14(1), 8.
- Maurya A.K, Kumar N., Agrawal A., Khan R.A(2017). Ransomware: Evolution, Target and Safety Measures.International Journal of Computer Sciences and Engineering, Volume-6,Issue-1.
- J. A. Sherer, “Ransomware -practical and legal considerations for confronting the new economic engine of the dark web,” Richmond Journal of Law and Technology, vol. XXIII, pp. 1–49, 2017.
- CyberEdge, “Cyberthreat Defense Report,” 2021, https://cyber-edge.com/cdr/.
- A. S. A. Bander, B. A. S. Al-rimy, M. A. Maarof, and S. Z. M. Shaid, “Ransomware threat success factors, taxonomy, and countermeasures: a survey and research directions,” Computers & Security, vol. 74, pp. 144–166, 2018.
- DigitalGuardian, “A History of Ransomware Attacks,” The Biggest and Worst Ransomware Attacks of All Time, vol. 12, 2019.
- J. DeCapua and S. Francisco, “Feds fighting ransomware: how the FBI investigates and how you can help,” Seminar “Emerging Threats” at RSA Conference, vol. 1, 2020.
- RansomwareTaskForce, “Combatting Ransomware. A comprehensive framework for action: key recommendations from the Ransomware Task Force,” 2021, https://securityandtechnology.org/ransomwaretaskforce/report/.
- Enterprise Survival Guide for Ransomware Attacks https://www.sans.org/reading-room/whitepapers/incident/enterprise-survival-guide-ransomware-attacks-36962
- Steps to Take on Ransomware http://www.govtech.com/security/5-Steps-Ransomware-Defense-in-Layers-Approach.html
- FBI says crypto ransomware has raked in >$18 million for cybercriminals https://arstechnica.com/security/2015/06/fbi-says-crypto-ransomware-has-raked-in-18-million-for-cybercriminals/
- Ransomware https://en.wikipedia.org/wiki/Ransomware#cite_note-ars-fbicryptowall-11
- Reasons Why You Should Take Ransomware Seriously http://www.darkreading.com/endpoint/4-reasons-why-you-should-take-ransomware-seriously/a/d-id/1327933
- Ransomware attacks against businesses increased threefold in 2016 https://www.pcworld.idg.com.au/article/611399/ransomware-attacks-against-businesses-increased-threefold-2016/
- Things you can do to protect against Ransomware https://www.welivesecurity.com/2013/12/12/11-things-you-can-do-to-protect-against-ransomware-including-cryptolocker/
- H. Oz, A. Aris, A. Levi, and A. S. UluagacUluagac, “A survey on ransomware: evolution, taxonomy, and defense solutions,” ACM Computing Surveys, vol. 1–39, 2022.
- H. AlshaikhAlshaikh, N. Ramadan, and H. AhmedAhmed, “Ransomware prevention and mitigation techniques,” International Journal of Computer Application, vol. 177, no. 40, pp. 31–39, 2020.
- Cybereason, “Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert,” 2020, https://www.cybereason.com/blog/cybereason-honeypot-multistage-ransomware.
- Types of ransomware : https://www.crowdstrike.com/cybersecurity-101/ransomware/types-of-ransomware/