Journal article Open Access
M. Z. Shaikh; Sulakshana B. Mane
{ "inLanguage": { "alternateName": "eng", "@type": "Language", "name": "English" }, "about": [ { "@id": "", "@type": "CreativeWork" }, { "@id": "https://hdl.handle.net/C5980029320 /2020\u00a9BEIESP", "@type": "CreativeWork" } ], "description": "<p>Ransom ware is type of Cyber malware which is used by attacker to block the computer system until some ransom is paid by victim .It propagates by malicious email attachments, links offering free software internet downloads etc. During given time it has to pay money which is demanded by ransom ware. This paper indicates the introduction of Ransom ware. How it works and types, attack methodology and threat carriers of Ransom ware and preventative precautions</p>", "license": "https://creativecommons.org/licenses/by/4.0/legalcode", "creator": [ { "affiliation": "Principal, Bhagubhai Mafatlal Polytechnique, Navi Mumbai, India.", "@type": "Person", "name": "M. Z. Shaikh" }, { "affiliation": "Bhrarati Vidyapeeth College of Engineering, Navi Mumbai, India.", "@type": "Person", "name": "Sulakshana B. Mane" } ], "headline": "Injection, Execution and Infection Working of Ransom ware", "image": "https://zenodo.org/static/img/logos/zenodo-gradient-round.svg", "datePublished": "2020-02-29", "keywords": [ "Ransom ware, locker, Encryption, Crime ware, Preventation" ], "url": "https://zenodo.org/record/5595623", "contributor": [ { "affiliation": "Publisher", "@type": "Person", "name": "Blue Eyes Intelligence Engineering & Sciences Publication (BEIESP)" } ], "@context": "https://schema.org/", "identifier": "https://doi.org/10.35940/ijeat.C5980.029320", "@id": "https://doi.org/10.35940/ijeat.C5980.029320", "@type": "ScholarlyArticle", "name": "Injection, Execution and Infection Working of Ransom ware" }
Views | 41 |
Downloads | 19 |
Data volume | 11.8 MB |
Unique views | 39 |
Unique downloads | 19 |