logo

ISYS100 Information Technology and society

   

Added on  2021-10-19

13 Pages3604 Words69 Views
Running head: RANSOMWARE ATTACKS AND DATA SECURITY
Ransomware Attacks and Data Security
Name of the Student
Name of the University
Author’s Note:
ISYS100 Information Technology and society_1
1
RANSOMWARE ATTACKS AND DATA SECURITY
Table of Contents
Introduction.................................................................................................2
Research Objectives....................................................................................2
Discussion...................................................................................................2
Ransomware Attacks................................................................................2
Security of Data due to Ransomware.......................................................4
Mitigation of Ransomware Attacks for Data Security...............................6
Conclusion...................................................................................................9
References................................................................................................10
ISYS100 Information Technology and society_2
2
RANSOMWARE ATTACKS AND DATA SECURITY
Introduction
Ransomware is the kind of the malicious software, which is
responsible for threatening to publish the confidential data of the victim
and even to block the access to that specific data unless and until a
ransom is being paid (Kharraz et al. 2015). In the properly deployed attack
of cryptoviral extortion, the file recovery is an extremely significant
problem without the specific decryption key. Hence, it becomes extremely
difficult to trace the attackers. Moreover, he uses digital currencies like
Ukash as well as crypto currencies like Bitcoin for ransom and thus
making tracing or prosecuting becomes quite difficult for the attackers
(Scaife et al. 2016).
The following research report will be outlining a brief discussion on
the topic of ransomware in in today’s world. The ransomware attacks have
spread in the technological world drastically and hence there is a major
question of data security. In recent days, it is being notified that the
ransomware attacks are becoming quite threatening for the users and this
report will be providing various relevant details regarding it.
Research Objectives
The important research objectives of this research report are as
follows:
i) To understand the entire concept of ransomware that is discussed
in the media in recent times.
ii) To find out the data security issues for the ransomware for
securing data.
iii) To search for suitable prevention techniques of ransomware
attacks.
Discussion
Ransomware Attacks
The ransomware or ransom malware is the kind of malware, which
could prevent the users from getting access to the personal files or
ISYS100 Information Technology and society_3
3
RANSOMWARE ATTACKS AND DATA SECURITY
systems and also demands the ransom payment for regaining the access
(Andronio, Zanero and Maggi 2015). The ransom is paid or is sent through
credit card or crypto currencies. There are various methods, which could
allow ransomware to infect the system or computer. The most common
method of the ransomware is by the mal spam or malicious spam that is
unsolicited electronic mails for delivering the malware. This ransomware
even comprises of links for the malicious web sites. The mal spam utilizes
the social engineering for tricking the people for opening the attachments
and clicking on the links by properly appearing as legal (Kharraz et al.
2016). The cyber criminals utilize the social engineering within other kinds
of ransomware attacks for locking the files and paying ransom.
The ransomware attacks could be carrying out with the help of
Trojan, which is subsequently disguised as the legitimate file (Mercaldo et
al. 2016). The victim is then tricked into opening or downloading the file
as soon as it arrives as any electronic mail attachment. The most
significant example of the ransomware is the Wanna Cry worm and this
worm travels within the several computer systems without any type of
user’s interaction automatically (Continella et al. 2016). Another popular
example of this ransomware attack is the Crypto Locker. It is a specific
Trojan horse, which remains active on the Internet. The kits of
ransomware on the deep web have eventually allowed the cyber criminals
for purchasing as well as utilizing a typical software tool and creating the
ransomware with proper capabilities (Brewer 2016).
The various web sites of social media are the major victims of these
types of ransomware attacks (Song, Kim and Lee 2016). The main reason
for this vulnerability is that there are various users of social media and it
is extremely easy to target these sites. According to a survey, more than
70% of the scams of social media are being shared manually by the
people. These types of ransomware attacks could be completed by
undertaking some of the steps (Pathak and Nanded 2016). The victim
would eventually download as well as run the executable files or folders
from several links. The second step of this attack is that the files are kept
ISYS100 Information Technology and society_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Disaster Recovery Plan - Ransomware
|4
|1258
|147

Malware Research Analysis 2022
|6
|1205
|19

Security threats Assignment PDF
|17
|5254
|133

Ransomware Attack in University Report 2022
|8
|1910
|20

INFORMATION TECHNOLOGY MANAGEMENT.
|4
|475
|380

Biggest ransomware outbreak in history hits nearly 100 countries with data held for ransom
|4
|1390
|366