Cyber Malwares and Attack Workflow

Sulakshana B. Mane*, M. Z. Shaikh**
* Bharati Vidyapeeth College of Engineering, Navi, Mumbai. Maharashtra, India.
** Shri Bhagubhai Mafatlal Polytechnic, Irla, N.R.G Marg, Mumbai, Maharashtra, India.
Periodicity:January - June'2022
DOI : https://doi.org/10.26634/jcs.11.1.18665

Abstract

Security plays an extremely important role for users in terms of digital India, the Internet, and the IoT era. Every user is now getting access to data and moving towards digitization in today's world. Due to the transfer of information everywhere in the organization due to processing vast amounts of knowledge, it faces numerous cyber-malware problems. Various sectors are adopting more technology to improve communications and infrastructure, and the cyber threat to these networks is growing in parallel. Cyber-malware and its class is ransomware. When it spreads, it locks the machine and encrypts it. Its impact performs various functions, such as confidential data theft, data misuse, and unauthorized access. The goal of this paper is to explore methods to counter ransomware attacks. This paper provides an understanding of cyber malware, why cyber malware is chosen as ransomware, and the attack process of cyber malware.

Keywords

Digital India, Cyber malware, Ransomware, Security, Classes, Attack Workflow.

How to Cite this Article?

Mane, S. B., and Shaikh, M. Z. (2022). Cyber Malwares and Attack Workflow. i-manager’s Journal on Communication Engineering and Systems, 11(1), 27-32. https://doi.org/10.26634/jcs.11.1.18665

References

[1]. Alhayani, B., Abbas, S. T., Khutar, D. Z., & Mohammed, H. J. (2021). Best ways computation intelligent of face cyber attacks. Materials Today: Proceedings.
[2]. Altwairqi, A. F., AlZain, M. A., Soh, B., Masud, M., & Al- Amri, J. (2019). Four most famous cyber attacks for financial gains. Int. J. Eng. Adv. Technol, 9, 2131-2139.
[3]. Gandhi, K. A. & Kumar, P. V. D. (2017). Survey on ransomware: a new era of cyber attack. International Journal of Computer Applications, 168(3), 38-41. https://doi.org/10.5120/ijca2017914446
[4]. Gordon, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2005). 2005 CSI/FBI computer crime and security survey. Computer Security Journal, 21(3), 1.
[5]. Gupta, G., & Tripathi, K. (2017). Study on ransomware attack and its prevention. International Education & Research Journal, 3(5), 260-262.
[6]. Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. N. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence, 222-226. https://doi.org/10.1145/3168390.3168398
[7]. Kiru, M. U., & Jantan, A. B. (2019). The age of ransomware: understanding ransomware and its countermeasures. In Artificial Intelligence and Security Challenges in Emerging Networks, 1-37. https://doi.org/10.4018/978-1-5225-7353-1.ch001
[8]. Maiorca, D., Mercaldo, F., Giacinto, G., Visaggio, C. A., & Martinelli, F. (2017). R-PackDroid: API packagebased characterization and detection of mobile ransomware. In Proceedings of the Symposium on Applied Computing, 1718-1723.
[9]. Shukla, M., Mondal, S., & Lodha, S. (2016). Poster: Locally virtualized environment for mitigating ransomware threat. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1784-1786. https://doi.org/10.1145/2976749.2989051
[10]. Tailor, J. P., & Patel, A. D. (2017). A comprehensive survey: ransomware attacks prevention, monitoring and damage control. International Journal of Research and Scientific Innovation, 4(15), 116-121.
[11]. Techtarget. (n.d.). Retrieved from https://www.techtarget.com/searchsecurity/tip/10-common-types-ofmalware-attacks-and-how-to-prevent-them
[12]. Zakaria, W. Z. A., Abdollah, M. F., Mohd, O., & Ariffin, A. F. M. (2017). The rise of ransomware. In Proceedings of the 2017 International Conference on Software and e- Business, 66-70. https://doi.org/10.1145/3178212.3178224
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.