Injection, Execution and Infection Working of Ransom ware
M. Z. Shaikh1, Sulakshana B. Mane2

1Dr. M. Z. Shaikh, Principal,  Bhagubhai Mafatlal Polytechnique, Navi Mumbai, India.
2Prof. Sulakshana B. Mane,  Bhrarati Vidyapeeth College of Engineering, Navi Mumbai, India.
Manuscript received on January 24, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 29, 2020. | PP: 4181-4183 | Volume-9 Issue-3, February 2020. | Retrieval Number:  C5980029320/2020©BEIESP | DOI: 10.35940/ijeat.C5980.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Ransom ware is type of Cyber malware which is used by attacker to block the computer system until some ransom is paid by victim .It propagates by malicious email attachments, links offering free software internet downloads etc. During given time it has to pay money which is demanded by ransom ware. This paper indicates the introduction of Ransom ware. How it works and types, attack methodology and threat carriers of Ransom ware and preventative precautions
Keywords: Ransom ware, locker, Encryption, Crime ware, Preventation.