Research on Ransomware Mechanism
碩士 === 正修科技大學 === 資訊工程研究所 === 106 === The ransomware is a kind of malware, its main behavior is to prevent you from accessing computer system or data until you pay a requested ransom. With the booming internet, malicious attacks are increasing rapidly, in which ransomware is raging for making huge p...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2017
|
Online Access: | http://ndltd.ncl.edu.tw/handle/x3y965 |
id |
ndltd-TW-106CSU00394001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106CSU003940012019-09-19T03:29:59Z http://ndltd.ncl.edu.tw/handle/x3y965 Research on Ransomware Mechanism 勒索病毒機制之研究 CHENG, YU-SHENG 鄭右昇 碩士 正修科技大學 資訊工程研究所 106 The ransomware is a kind of malware, its main behavior is to prevent you from accessing computer system or data until you pay a requested ransom. With the booming internet, malicious attacks are increasing rapidly, in which ransomware is raging for making huge profits. After its invasion of your computer, important document files are encrypted so that you can't access again until you get the decryption key by paying the ransom. The ransomware has been the most serious cyber threat in last year, so the year 2016 was called "the year of ransomware". This paper begins with description of study motivation then a brief introduction about ransomware development, followed by discussion of its infection vectors and attack techniques. Finally, a feasible defense strategy is proposed to mitigate the ransomware impact and reduce the suffered losses. HSU, PO-HSUEH 許博學 2017 學位論文 ; thesis 61 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 正修科技大學 === 資訊工程研究所 === 106 === The ransomware is a kind of malware, its main behavior is to prevent you from accessing computer system or data until you pay a requested ransom. With the booming internet, malicious attacks are increasing rapidly, in which ransomware is raging for making huge profits. After its invasion of your computer, important document files are encrypted so that you can't access again until you get the decryption key by paying the ransom.
The ransomware has been the most serious cyber threat in last year, so the year 2016 was called "the year of ransomware". This paper begins with description of study motivation then a brief introduction about ransomware development, followed by discussion of its infection vectors and attack techniques. Finally, a feasible defense strategy is proposed to mitigate the ransomware impact and reduce the suffered losses.
|
author2 |
HSU, PO-HSUEH |
author_facet |
HSU, PO-HSUEH CHENG, YU-SHENG 鄭右昇 |
author |
CHENG, YU-SHENG 鄭右昇 |
spellingShingle |
CHENG, YU-SHENG 鄭右昇 Research on Ransomware Mechanism |
author_sort |
CHENG, YU-SHENG |
title |
Research on Ransomware Mechanism |
title_short |
Research on Ransomware Mechanism |
title_full |
Research on Ransomware Mechanism |
title_fullStr |
Research on Ransomware Mechanism |
title_full_unstemmed |
Research on Ransomware Mechanism |
title_sort |
research on ransomware mechanism |
publishDate |
2017 |
url |
http://ndltd.ncl.edu.tw/handle/x3y965 |
work_keys_str_mv |
AT chengyusheng researchonransomwaremechanism AT zhèngyòushēng researchonransomwaremechanism AT chengyusheng lēisuǒbìngdújīzhìzhīyánjiū AT zhèngyòushēng lēisuǒbìngdújīzhìzhīyánjiū |
_version_ |
1719252140903366656 |