Ransomware: The CryptoVirus Subverting Cloud Security
Title | Ransomware: The CryptoVirus Subverting Cloud Security |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Bhattacharya, S., Kumar, C. R. S. |
Conference Name | 2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET) |
ISBN Number | 978-1-5090-3378-2 |
Keywords | Business, business enterprises, cloud, cloud architecture, cloud computing, cloud network, cloud platforms, Cloud Security, cloud technology, cloud threat mechanisms, Computer architecture, computer viruses, cryptography, CryptoVirus, disparate locations, Human Behavior, human factors, information technology, IT security specialists, Malware, Metrics, pubcrawl, ransomware, ransomware attack, ransomware vulnerabilities, Resiliency, Scalability, security, security effectiveness, security threat, Servers, threats, ubiquitous computing, Ubiquitous Computing Security, ubiquitous environment, vulnerabilities |
Abstract | Cloud computing presents unlimited prospects for Information Technology (IT) industry and business enterprises alike. Rapid advancement brings a dark underbelly of new vulnerabilities and challenges unfolding with alarming regularity. Although cloud technology provides a ubiquitous environment facilitating business enterprises to conduct business across disparate locations, security effectiveness of this platform interspersed with threats which can bring everything that subscribes to the cloud, to a halt raises questions. However advantages of cloud platforms far outweighs drawbacks and study of new challenges helps overcome drawbacks of this technology. One such emerging security threat is of ransomware attack on the cloud which threatens to hold systems and data on cloud network to ransom with widespread damaging implications. This provides huge scope for IT security specialists to sharpen their skillset to overcome this new challenge. This paper covers the broad cloud architecture, current inherent cloud threat mechanisms, ransomware vulnerabilities posed and suggested methods to mitigate it. |
URL | http://ieeexplore.ieee.org/document/8186691/ |
DOI | 10.1109/ICAMMAET.2017.8186691 |
Citation Key | bhattacharya_ransomware:_2017 |
- security
- malware
- Metrics
- pubcrawl
- Ransomware
- ransomware attack
- ransomware vulnerabilities
- Resiliency
- Scalability
- IT security specialists
- security effectiveness
- security threat
- Servers
- threats
- ubiquitous computing
- Ubiquitous Computing Security
- ubiquitous environment
- vulnerabilities
- cloud threat mechanisms
- business enterprises
- cloud
- Cloud architecture
- Cloud Computing
- cloud network
- cloud platforms
- Cloud Security
- cloud technology
- Business
- computer architecture
- computer viruses
- Cryptography
- CryptoVirus
- disparate locations
- Human behavior
- Human Factors
- information technology