**Peer Review Journal ** DOI on demand of Author (Charges Apply) ** Fast Review and Publicaton Process ** Free E-Certificate to Each Author

Current Issues
     2026:7/2

International Journal of Multidisciplinary Research and Growth Evaluation

ISSN: (Print) | 2582-7138 (Online) | Impact Factor: 9.54 | Open Access

A Disruptive Ransomware: Its Impersonation Process, Identification and Avoidance

Full Text (PDF)

Open Access - Free to Download

Download Full Article (PDF)

Abstract

With science and technology advances, the capabilities and capacities of users' electronics gadgets are expanding at a rapid rate for saving more and more data, but meanwhile, such gadgets are always at high risk of compromising data security. Ransomware attacks are regarded as being very important, and they are extremely challenging to identify and handle. Here in this paper, the author introduces a disruptive Ransomware that is novel in its impersonation process to become a threat and can be discreetly installed by evading Windows Defender, Firewall, and Antivirus. It is also unique in that it is proficient at managing information. This article, along with its different sections, introduces various approaches to identify and avoid it.

How to Cite This Article

Bhagwant Singh, Dr. Sikander Singh Cheema (2025). A Disruptive Ransomware: Its Impersonation Process, Identification and Avoidance . International Journal of Multidisciplinary Research and Growth Evaluation (IJMRGE), 6(2), 238-245.

Share This Article: