Return to Article Details Analysis and prevention techniques for ransomware attacks