Resumen
© 2017 IEEE. Constant ransomware attacks achieve to evade multiple security perimeters, because its strategy is based on the exploitation of users—the weakest link in the security chain—getting high levels of effectiveness. In this paper, an in-depth analysis of the anatomy of the ransomware is develop, and how they combine technology with manipulation, through social engineering, to meet their goals and compromise thousands of computers. Finally, simulations of the phases that it follows are carried out, leaving the necessary guidelines to evaluate the security of the information, and thus, generate policies that minimize the risks of loss of information.
Idioma original | Inglés estadounidense |
---|---|
Páginas | 1-6 |
Número de páginas | 6 |
DOI | |
Estado | Publicada - 19 dic. 2017 |
Evento | 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2017 - Proceedings - Pucon, Chile Duración: 18 oct. 2017 → 20 oct. 2017 |
Conferencia
Conferencia | 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, CHILECON 2017 - Proceedings |
---|---|
Título abreviado | CHILECON 2017 |
País/Territorio | Chile |
Ciudad | Pucon |
Período | 18/10/17 → 20/10/17 |