![]() The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. With the increased use of technologies in our life, the cybercrimes have amplified. In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. Securing university networks in 2020 was a challenge for specialists in this field. As a result, of the research conducted, the top Cyber threats of HEIs are: malware attacks, DoS / DDos attacks and phishing attacks. In order to identify the biggest threats of the 2020 year, for HEIs, several security reports and scientific articles related to the studied field were analyzed, in order to identify the most common security threats. However, this has increased the threats to information security, so that in 2020, in the field of education in general, and HEIs in particular, the number of cyber-attacks has increased, which has led to significant financial losses but also to activity interruption and theft of personal data or intellectual property. To ensure the quality of distance learning have been implemented and used extensively online learning platforms, applications, video conferencing and cloud computing facilities in HEIs. Distance learning has become the unique opportunity that the process further education in conditions where most economic activities were put on hold. The Covid-19 pandemic has significantly changed the way higher education institutions (HEIs) operate around the world. Thus, a lot of solutions are giving out by the researcher to overcome the problem after the attack. #Akila ware freeHowever, many preventions allow the user to avoid the ransomware propagate but the system is not fully free from the ransomware attack. Otherwise, the weaknesses of security knowledge also become one of the causes. There is a lot of reason that cause the ransomware attack around the world, for example, the vulnerability of the system. The victims are only allowed to access after pay the demand using crypto-currencies such as Bitcoin. A ransom demand message will prompt the user so that they will gain the money anonymously. Ransomware attacks the victim by infecting the malicious file into the device they will encrypt and deny the victim to access it. #Akila ware softwareRansomware is one of the families of malicious software that spread quickly and cause a critical impact around the world. The development of science and technology in this era brought many advantages for peoples, organizations, enterprises, and companies merely a lot of cyber threats are occurring nowadays. The researcher points out few steps to save systems and data. What are the safety measures to save the system from ransomware, are also discussed by the researcher. After anĪttack, what a victim should do after infection is also discussed at the end of the paper. This paper trying toĭemonstrate few ransomware attacks case studies to show the problem created by various ransomware as an example. Different attackers madeĬhoices to the target various attack the paper provides a sight on various target types of the ransomware. Various kind of infection performed by a ransomware including data infection and infected machine. In evolution part, the paper provides s study from first ransomware to current days. This paper shows working of ransomware with its evolution and general characteristics of few popular With the viruses, malware and ransomware are another problems seen by ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |