Excerpt
Table of Contents
Acknowledgements
1.0 ABSTRACT
2.0 INTRODUCTION
3.0 LITERATURE REVIEW
3.1 Ransomware comes in a variety of forms.
3.2 Phases of Ransomware
3.3 An attack channel for ransomware
3.4 The Ransomware Process
4.0 Research Question
4.1 Is it possible to detect ransomware on a network that is using the samba protocol?
5.0 METHODOLOGY
5.1 Sampling method
6.0 RESEARCH FINDINGS
6.1 Dependability and validity
7.0 DISCUSSION
8.1 Preventive Measures
8.2 Email etiquette
8.3 Advanced monitoring and recognition
8.4 Disaster recovery and backups
9.0 CONCLUSION
10.0 REFERENCES
Excerpt out of 36 pages
- Quote paper
- Rhoda Kariuki (Author), 2023, Critical Analysis of Ransomware in Relation to Cybercrime, Munich, GRIN Verlag, https://www.grin.com/document/1375124
Publish now - it's free
✕
Excerpt from
36
pages
Comments