Results for 'Ransomware'

11 found
Order:
  1.  74
    RANSOMWARE TRENDS AND EFFECTIVE MITIGATION TECHNIQUES IN 2018.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research 2 (1):1-5.
    : Ransomware remains one of the most significant cybersecurity threats, evolving rapidly with new attack vectors, encryption techniques, and extortion models. As we enter 2018, ransomware attacks have become more sophisticated, leveraging artificial intelligence (AI), automation, and emerging technologies to bypass traditional security measures. This paper analyzes the latest ransomware trends, including targeted attacks on critical infrastructure, Ransomware-as-a-Service (RaaS), and double/triple extortion tactics. Additionally, it explores advanced mitigation techniques such as AI-driven anomaly detection, zero-trust architectures, blockchain-based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  70
    Home Depot Breach or The Rise of Ransomware.Vaka Pavan Reddy - 2014 - Neuroquantology 12 (4):485-491.
    The Home Depot data breach, which occurred in 2014, marked a significant turning point in the cybersecurity landscape, drawing attention to the increasing prevalence of ransomware and cyberattacks targeting large-scale retail organizations. This breach exposed the personal and financial information of over 56 million customers and highlighted the vulnerabilities in the systems used by major corporations. The attack was attributed to a sophisticated ransomware operation that gained access through a third-party vendor’s compromised credentials, ultimately enabling cybercriminals to infiltrate (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  3. Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. AI vs Cyber Threats: Real-World Case Studies on Securing Healthcare Data.Nushra Tul Zannat Sabira Arefin - 2025 - International Journal of Advanced Research in Education and Technology 12 (2):396-404.
    The increasing rate and sophistication of cyber attacks pose a major risk to health data security. Traditional security systems cannot handle advanced ransomware, insider threats, and phishing attacks and hence incorporation of artificial intelligence (AI) into cybersecurity solutions becomes the need of the hour. AI-based security solutions leverage machine learning, behavior analysis, and real-time anomaly detection to identify and counter threats before they affect sensitive patient information. This study examines real-world case studies where AI successfully prevented cyberattacks in healthcare (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: beneficence, non-maleficence, autonomy, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Cybercrime and Online Safety: Addressing the Challenges and Solutions Related to Cybercrime, Online Fraud, and Ensuring a Safe Digital Environment for All Users— A Case of African States (10th edition).Emmanuel N. Vitus - 2023 - Tijer- International Research Journal 10 (9):975-989.
    The internet has made the world more linked than ever before. While taking advantage of this online transition, cybercriminals target flaws in online systems, networks, and infrastructure. Businesses, government organizations, people, and communities all across the world, particularly in African countries, are all severely impacted on an economic and social level. Many African countries focused more on developing secure electricity and internet networks; yet, cybersecurity usually receives less attention than it should. One of Africa's major issues is the lack of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Intelligence Info, Volumul 2, 2023.Nicolae Sfetcu - 2023 - Intelligence Info 2.
    Revista Intelligence Info este o publicație trimestrială din domeniile intelligence, geopolitică și securitate, și domenii conexe de studiu și practică. -/- Cuprins: -/- EDITORIALE / EDITORIALS -/- Tiberiu TĂNASE Considerații privind necesitatea educării și formării resursei umane pentru intelligence–ul național Considerations regarding the need to educate and train human resources for national intelligence Nicolae SFETCU Epistemologia activității de intelligence Epistemology of intelligence Nicolae SFETCU Rolul serviciilor de informații în război The role of the intelligence agencies in a war Nicolae SFETCU (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Protecting Australia against Cyberterrorism.Marcia Ricci Pinheiro - 2017 - IOSR Journal Of Humanities And Social Science (IOSR-JHSS) 22 (9):1-6.
    We talk about how to best protect Australia against cyberterrorist attacks of the type in which the offenders use a computer to attack or in which the offenders attack computers. Our concern is phenomena like Stuxnet and Ransomware, but also any attack that has not yet happened, as for our official records, so say hacking of satellite and use of its allowances to burn people alive to death. We talk about the basics, which could be the advice of FireEye, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Future of Cybersecurity: Emerging Threats and Mitigation Strategies.Swapna V. Sneha P. - 2021 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 8 (12):1306-1312.
    As technology rapidly advances, the landscape of cybersecurity faces increasingly complex and evolving threats. This paper explores the future of cybersecurity, focusing on emerging threats and the corresponding mitigation strategies. Key threats include AI-driven attacks, ransomware evolution, quantum computing vulnerabilities, IoT security risks, cloud security challenges, and supply chain attacks. These threats have the potential to disrupt organizations and compromise sensitive data on an unprecedented scale. To address these challenges, the paper outlines effective mitigation strategies such as leveraging AI (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  44
    Cybersecurity and Network Engineering: Bridging the Gap for Optimal Protection.Bellamkonda Srikanth - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):2701-2706.
    : In the digital age, cybersecurity and network engineering are two integral disciplines that must operate in unison to safeguard information and ensure the resilience of modern systems. While network engineering focuses on designing, implementing, and maintaining infrastructure, cybersecurity emphasizes protecting this infrastructure and its data from threats. This research explores the intricate relationship between these domains, advocating for a unified approach to achieve optimal protection in an increasingly interconnected world. The study highlights the evolving threat landscape characterized by sophisticated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  23
    Mitigating Cyber Threats and Protecting Data Privacy.Baladari Venkata - 2020 - Journal of Scientific and Engineering Research 7 (8):279-288.
    The rapid growth of digital technologies has heightened cybersecurity and data protection issues, putting individuals and organizations at risk of surveillance, cyber-attacks, and data misuse. The collection of large amounts of data by governments and companies has sparked worries about ethics and the law and cyberattacks such as ransomware and significant data theft incidents demonstrate major security weaknesses. This paper examines the nexus of cybersecurity and privacy, specifically investigating state-sponsored espionage, algorithmic data profiling, and regulatory frameworks. The analysis investigates (...)
    Download  
     
    Export citation  
     
    Bookmark