Method and system for preventing ransomware or phishing attack
A phishing and software technology, applied in the field of preventing ransomware or phishing attacks, can solve problems such as troublesome registration of programs, only prevent data encryption, program inconvenience, etc., and achieve the effect of preventing and preventing phishing attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] As the first technical purpose of the present invention, the server system for preventing ransomware attacks will be described below (see Figure 1 to Figure 3 ).
[0038] Below, in reference to Figure 1 to Figure 3 Before explaining the server system for preventing ransomware attack according to the embodiment of the present invention, in order to help understanding of the present invention, the difference between the embodiment of the present invention and other embodiments is as follows.
[0039] In the prior art, there is a "program-based read-only memory" implementation, which is a way to judge whether it is a program authorized by the file protection policy. If it is an authorized program, the file can be modified. If not, it can only be read-only. technology that operates in mode. In this program-based ROM implementation, commands and responses are basically executed in units of files, and therefore, files are provided in read-only mode in units of files. Howev...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


