Abstract
Ransomware is a noteworthy form of attack that is well-known for the threat it poses to users. This danger invariably leads to huge conflicts, which cybersecurity seeks to prevent. In most cases, ransomware will encrypt or lock files on the computer or mobile device that it is targeting, and then demand money to decrypt those files. It is necessary to implement some of the proposed solutions to prevent or mitigate this problem. Many research papers have developed certain tools and ways to prevent ransomware attacks before they occur or identify them when it occurs, however they are frequently compromised within a short period. The purpose of this survey is to provide an analysis of the most recent developments in ransomware research as well as detection and protection methods. This paper will, for the most part, revolve around three significant questions, each of which will be examined through the lens of risk management in turn: How can an android operating system be ready for and protected from a ransomware attack before it happens? What actions may a user take in response to a ransomware attack to stop it or lessen the damage it causes during the attack? And how exactly can a person whose life has been disrupted by ransomware get their life back on track after the attack? Answering these questions will put us one step closer to developing a unique methodology for managing the risk of Android ransomware. As a consequence of this, properly managing the risk will make it nearly impossible for an android ransomware attack to be successful, and in the worst-case scenario, the user will be able to recover the infected data by referring to the backup copy.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.