Loading

Elucidating Ransomware Attacks In Cyber-Security
Cyrus Mehra1, Arvind Sharma2, Avinash Sharma3

1Cyrus Mehra*, Scholar, MM Institute of Computer Technology & Business Management (MCA), Punjab.
2Arvind Sharma, Assistant Professor, MM Institute of Computer Technology & Business Management (MCA) (MMDU), Haryana, Research Scholar, University School of Engineering, Rayat Bahra University, Punjab.
3Avinash Sharma, Professor, MM Engineering College (MMEC) MM(DU), Mullana, Ambala, Haryana.

Manuscript received on October 19, 2019. | Revised Manuscript received on 26 October, 2019. | Manuscript published on November 10, 2019. | PP: 3536-3541 | Volume-9 Issue-1, November 2019. | Retrieval Number: A8106119119/2019©BEIESP | DOI: 10.35940/ijitee.A8106.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Attack Detection and Prevention services or activities has distinct significance in the subdomains like ‘Computer Security’ and ‘Internet-Security’ of Networking as compare to other activities of the same area. Major issues arise when resources get compromised with the unauthorized user(s) having adverse effects afterward. Even though much standard security mechanism like IDS, Cryptographic Techniques available to provide security & authenticity still some attacks are undetectable like Ransomware which force security providing agencies to take initiative in this direction with proper conceptions.
Keywords: Adversary, Anti-Piracy, Antivirus, Bit-Coins, Cyber Security, Dark-Web, Encryption-Decryption, Internet-Security Suite, Intrusion-Detection-Systems (IDS), Malware, Software,
Scope of the Article: Cyber Security