Cloud - Based Ransomware Attack on US Financial Institutions: An In - depth Analysis of Tactics and Counter Measures
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 16 | Views: 577 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper | Information Security | United States of America | Volume 13 Issue 2, February 2024 | Popularity: 6 / 10


     

Cloud - Based Ransomware Attack on US Financial Institutions: An In - depth Analysis of Tactics and Counter Measures

Oladipupo M. Dopamu


Abstract: This study examines the evolving landscape of ransomware threats targeting cloud - based systems in US financial institutions. Through a comprehensive analysis of recent attack patterns, defense mechanisms, and case studies, we identify vulnerabilities and assess the effectiveness of current cybersecurity measures. Our findings reveal a significant increase in sophisticated ransomware attacks exploiting cloud - specific vulnerabilities. The research underscores the need for financial institutions to adopt advanced, layered security strategies, incorporating Al and blockchain technologies, to mitigate these risks effectively. This paper contributes to the cybersecurity field by offering insights into ransomware tactics and proposing innovative defense solutions tailored to the cloud computing environment.


Keywords: Cloud Security, Ransomware Attacks, Financial Institutions, Cybersecurity Measures, Attack Mitigation Strategies


Edition: Volume 13 Issue 2, February 2024


Pages: 1872 - 1881


DOI: https://www.doi.org/10.21275/SR24226020353



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Oladipupo M. Dopamu, "Cloud - Based Ransomware Attack on US Financial Institutions: An In - depth Analysis of Tactics and Counter Measures", International Journal of Science and Research (IJSR), Volume 13 Issue 2, February 2024, pp. 1872-1881, https://www.ijsr.net/getabstract.php?paperid=SR24226020353, DOI: https://www.doi.org/10.21275/SR24226020353

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024

Pages: 738 - 747

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi

Share this Article

Downloads: 15 | Weekly Hits: ⮙3 | Monthly Hits: ⮙6

Analysis Study Research Paper, Information Security, United States of America, Volume 13 Issue 4, April 2024

Pages: 176 - 180

Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach

Megha Manglani

Share this Article
Top