Loading

A Proposed Methodology to Prevent a Ransomware Attack
Salunke M.D1, Kumbharkar P.B.2, Yogesh Kumar Sharma3

1Salunke M.D., PhD scholar, Shri. JJT University, Jhunjhunu, Rajasthan, India.
2Dr. P.B. Kumbharkar, Shri JJT University, Jhunjhunu, Rajasthan, India.
3Dr. Yogesh Kumar Sharma, Shri JJT University, Jhunjhunu, Rajasthan, India.

Manuscript received on May 02, 2020. | Revised Manuscript received on May 21, 2020. | Manuscript published on May 30, 2020. | PP: 2723-2725 | Volume-9 Issue-1, May 2020. | Retrieval Number:A2860059120/2020©BEIESP | DOI: 10.35940/ijrte.A2860.059120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: RANSOMWARE as malware, increasing threat, three techniques-prevent, detect and mitigate, backup, software updates, educating users, network protection, software optimization, antivirus solution, don’t pay ransom, RDP (remote desktop protocol), disabling macros, principle of least privilege, software restriction policies(SRP), Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), Domain Keys Identified Mail (DKIM), administrative rights, network segmentation.
Keywords: Identified Mail (DKIM), administrative rights, network segmentation.
Scope of the Article: Systems and Software Engineering