Research on Ransomware Mechanism

碩士 === 正修科技大學 === 資訊工程研究所 === 106 === The ransomware is a kind of malware, its main behavior is to prevent you from accessing computer system or data until you pay a requested ransom. With the booming internet, malicious attacks are increasing rapidly, in which ransomware is raging for making huge p...

Full description

Bibliographic Details
Main Authors: CHENG, YU-SHENG, 鄭右昇
Other Authors: HSU, PO-HSUEH
Format: Others
Language:zh-TW
Published: 2017
Online Access:http://ndltd.ncl.edu.tw/handle/x3y965
id ndltd-TW-106CSU00394001
record_format oai_dc
spelling ndltd-TW-106CSU003940012019-09-19T03:29:59Z http://ndltd.ncl.edu.tw/handle/x3y965 Research on Ransomware Mechanism 勒索病毒機制之研究 CHENG, YU-SHENG 鄭右昇 碩士 正修科技大學 資訊工程研究所 106 The ransomware is a kind of malware, its main behavior is to prevent you from accessing computer system or data until you pay a requested ransom. With the booming internet, malicious attacks are increasing rapidly, in which ransomware is raging for making huge profits. After its invasion of your computer, important document files are encrypted so that you can't access again until you get the decryption key by paying the ransom. The ransomware has been the most serious cyber threat in last year, so the year 2016 was called "the year of ransomware". This paper begins with description of study motivation then a brief introduction about ransomware development, followed by discussion of its infection vectors and attack techniques. Finally, a feasible defense strategy is proposed to mitigate the ransomware impact and reduce the suffered losses. HSU, PO-HSUEH 許博學 2017 學位論文 ; thesis 61 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 正修科技大學 === 資訊工程研究所 === 106 === The ransomware is a kind of malware, its main behavior is to prevent you from accessing computer system or data until you pay a requested ransom. With the booming internet, malicious attacks are increasing rapidly, in which ransomware is raging for making huge profits. After its invasion of your computer, important document files are encrypted so that you can't access again until you get the decryption key by paying the ransom. The ransomware has been the most serious cyber threat in last year, so the year 2016 was called "the year of ransomware". This paper begins with description of study motivation then a brief introduction about ransomware development, followed by discussion of its infection vectors and attack techniques. Finally, a feasible defense strategy is proposed to mitigate the ransomware impact and reduce the suffered losses.
author2 HSU, PO-HSUEH
author_facet HSU, PO-HSUEH
CHENG, YU-SHENG
鄭右昇
author CHENG, YU-SHENG
鄭右昇
spellingShingle CHENG, YU-SHENG
鄭右昇
Research on Ransomware Mechanism
author_sort CHENG, YU-SHENG
title Research on Ransomware Mechanism
title_short Research on Ransomware Mechanism
title_full Research on Ransomware Mechanism
title_fullStr Research on Ransomware Mechanism
title_full_unstemmed Research on Ransomware Mechanism
title_sort research on ransomware mechanism
publishDate 2017
url http://ndltd.ncl.edu.tw/handle/x3y965
work_keys_str_mv AT chengyusheng researchonransomwaremechanism
AT zhèngyòushēng researchonransomwaremechanism
AT chengyusheng lēisuǒbìngdújīzhìzhīyánjiū
AT zhèngyòushēng lēisuǒbìngdújīzhìzhīyánjiū
_version_ 1719252140903366656