International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 157 | Views: 265

Research Paper | Information Technology | India | Volume 7 Issue 5, May 2018 | Popularity: 6.3 / 10


     

Cyber Security: Ransomware Infects the Cloud

Shanthi D.L., Rachana B


Abstract: Ransomware is a type of malware in which the data on a victim & #039, s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. Ransomware attacks have emerged as one of the new threats to cloud computing because they store huge amounts of data. To safeguard the cloud users and cloud service providers against these attacks requires knowledge about ransomware attacks. This paper briefly discuses about types of ransomware attacks, how these attacks work, which are the targets of these attacks. It considers the impact of ransomware attacks on cloud and its users. Several security measures have been analyzed and a model which can be used in organizations has been designed. This model will help organizations to keep ransomware attacks away from their valuable resources.


Keywords: Ransomware, Malware, Targets of Ransomware


Edition: Volume 7 Issue 5, May 2018


Pages: 379 - 381



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shanthi D.L., Rachana B, "Cyber Security: Ransomware Infects the Cloud", International Journal of Science and Research (IJSR), Volume 7 Issue 5, May 2018, pp. 379-381, https://www.ijsr.net/getabstract.php?paperid=ART20182237, DOI: https://www.doi.org/10.21275/ART20182237



Similar Articles

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, United States of America, Volume 11 Issue 3, March 2022

Pages: 1634 - 1641

Adversarial Machine Learning: Attacks and Defense Mechanisms with Respect to AI Security

Rajashekhar Reddy Kethireddy

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Research Paper, Information Technology, United States of America, Volume 12 Issue 2, February 2023

Pages: 1766 - 1772

Remote Browser Isolation: A Path to Zero Trust Security in the Modern Enterprise

Dhaval Gogri

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙4

Research Paper, Information Technology, United States of America, Volume 11 Issue 1, January 2022

Pages: 1687 - 1694

Threats and Mitigation Strategies in Remote Work Scenarios: A Cybersecurity Perspective Post - COVID-19

Dhaval Gogri

Share this Article

Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Review Papers, Information Technology, United States of America, Volume 13 Issue 8, August 2024

Pages: 394 - 398

Securing Justice: Enhancing Cybersecurity in the Criminal Justice System

Deepthi Kallahakalu Vijay Dev

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1101 - 1105

Infectious Malware-Analysis and Protective Measures

Harjit Singh

Share this Article



Top