A Disruptive Ransomware: Its Impersonation Process, Identification and Avoidance
Abstract
With science and technology advances, the capabilities and capacities of users' electronics gadgets are expanding at a rapid rate for saving more and more data, but meanwhile, such gadgets are always at high risk of compromising data security. Ransomware attacks are regarded as being very important, and they are extremely challenging to identify and handle. Here in this paper, the author introduces a disruptive Ransomware that is novel in its impersonation process to become a threat and can be discreetly installed by evading Windows Defender, Firewall, and Antivirus. It is also unique in that it is proficient at managing information. This article, along with its different sections, introduces various approaches to identify and avoid it.
How to Cite This Article
Bhagwant Singh, Dr. Sikander Singh Cheema (2025). A Disruptive Ransomware: Its Impersonation Process, Identification and Avoidance . International Journal of Multidisciplinary Research and Growth Evaluation (IJMRGE), 6(2), 238-245.