Hampton et al., 2015 - Google Patents
Ransomware: Emergence of the cyber-extortion menaceHampton et al., 2015
View PDF- Document ID
- 8157655796869824924
- Author
- Hampton N
- Baig Z
- Publication year
External Links
Snippet
Ransomware is increasingly posing a threat to the security of information resources. Millions of dollars of monetary loss have been afflicted on end-users and corporations alike through unlawful deployment of ransomware. Through malware injection into end-user devices and …
- 230000035755 proliferation 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hampton et al. | Ransomware: Emergence of the cyber-extortion menace | |
| Dargahi et al. | A Cyber-Kill-Chain based taxonomy of crypto-ransomware features | |
| Mos et al. | The growing influence of ransomware | |
| Bajpai et al. | A key-management-based taxonomy for ransomware | |
| Upadhyaya et al. | Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet | |
| Nowroozi et al. | Cryptocurrency wallets: assessment and security | |
| Schechter et al. | Access for sale: A new class of worm | |
| Singh et al. | REvil Ransomware | |
| DS et al. | A systematic study on ransomware attack: types, phases and recent variants | |
| Tatara et al. | The Potential of Cyber Attacks in Indonesia's Digital Economy Transformation | |
| Tyagi et al. | A novel framework for password securing system from key-logger spyware | |
| Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
| Singh | Ransomware: an illustration of malicious cryptography | |
| Vakil et al. | Cyber Attacks: Detection and Prevention | |
| Lingamgunta | Cyber Security For Beginners | |
| Aboud et al. | Investigation of modern ransomware key generation methods: a review | |
| Pillai et al. | Design Considerations for Protection of Blockchain based Digital Identity Ecosystem. | |
| Chopra et al. | Perspectives of various cyber security threats and defense mechanisms in the modern world | |
| Chaithanya et al. | Early-stage analysis and mitigation tactics for ransomware assault exploits | |
| McGee et al. | How to counter cybercrime intrusions | |
| SANDU | Prevention of Widespread Ransomware Cyber-Attacks through the SEAP Platform | |
| Shivale | Cryptovirology: Virus Approach | |
| Schell et al. | HOW US AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017. | |
| Hart | The evolution of ransomware and its impacts on organizations | |
| Menon | Analysis of Ransomware for Prevention of Attacks |