Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/14311
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shilpa Narula | - |
dc.contributor.author | Anam Afaq | - |
dc.date.accessioned | 2024-03-01T08:05:20Z | - |
dc.date.available | 2024-03-01T08:05:20Z | - |
dc.date.issued | 2017 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/14311 | - |
dc.description.abstract | In today's technology surrounded world where computer users are increasing at a rapid rate, cybercriminals are also increasing to conduct pernicious activities. In the computer world, on one side, advanced encryption algorithms, can be utilized to protect valuable information. On the other side, they can also be used by the cybercriminals for extortion on a very large scale. Ransomware is an emerging cyber hijacking threat using such encryption technology for extortion. Ransomware locks your system or device and holds your system/device for ransom. The present research paper discusses ransomware extortion scheme, its evolution, factors driving its growth, different types and preventive measures that can be taken. | - |
dc.publisher | Journal of Management Entrepreneurship (JME) | - |
dc.subject | Bitcoin | - |
dc.subject | Cryptalocker | - |
dc.subject | Cybercrime | - |
dc.subject | Encryption | - |
dc.subject | Ransomware | - |
dc.title | Ransomware- a Growing Jeopardy | - |
dc.vol | Vol. 12 | - |
dc.issued | No. 3 | - |
Appears in Collections: | Articles to be qced |
Files in This Item:
File | Size | Format | |
---|---|---|---|
Ransomware A Growing Jeopardy.pdf Restricted Access | 1.8 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.