Journal article Open Access

Injection, Execution and Infection Working of Ransom ware

M. Z. Shaikh; Sulakshana B. Mane


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Ransom ware, locker, Encryption, Crime ware, Preventation</subfield>
  </datafield>
  <controlfield tag="005">20211026134844.0</controlfield>
  <controlfield tag="001">5595623</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Bhrarati Vidyapeeth College of  Engineering, Navi Mumbai, India.</subfield>
    <subfield code="a">Sulakshana B. Mane</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Publisher</subfield>
    <subfield code="4">spn</subfield>
    <subfield code="a">Blue Eyes Intelligence Engineering  &amp; Sciences Publication (BEIESP)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">622301</subfield>
    <subfield code="z">md5:1ca92f7059b53dd172244faa8979977a</subfield>
    <subfield code="u">https://zenodo.org/record/5595623/files/C5980029320.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-02-29</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="o">oai:zenodo.org:5595623</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="c">4181-4183</subfield>
    <subfield code="n">3</subfield>
    <subfield code="p">International Journal of Engineering and Advanced Technology (IJEAT)</subfield>
    <subfield code="v">9</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Principal, Bhagubhai Mafatlal Polytechnique, Navi  Mumbai, India.</subfield>
    <subfield code="a">M. Z. Shaikh</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Injection, Execution and Infection Working of  Ransom ware</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">ISSN</subfield>
    <subfield code="0">(issn)2249-8958</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2=" ">
    <subfield code="a">Retrieval Number</subfield>
    <subfield code="0">(handle)C5980029320 /2020©BEIESP</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;Ransom ware is type of Cyber malware which is used by attacker to block the computer system until some ransom is paid by victim .It propagates by malicious email attachments, links offering free software internet downloads etc. During given time it has to pay money which is demanded by ransom ware. This paper indicates the introduction of Ransom ware. How it works and types, attack methodology and threat carriers of Ransom ware and preventative precautions&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">issn</subfield>
    <subfield code="i">isCitedBy</subfield>
    <subfield code="a">2249-8958</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.35940/ijeat.C5980.029320</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
42
19
views
downloads
Views 42
Downloads 19
Data volume 11.8 MB
Unique views 40
Unique downloads 19

Share

Cite as