Review of a ransomware protection by simulating an encryption Trojan