logo

Assignment on IT Security

   

Added on  2020-03-23

11 Pages2440 Words125 Views
Running head: ITAssignment WeekName of StudentName of Institute

2IT SecurityTable of ContentsIntroduction..............................................................................................................................3Background - Ransomware.....................................................................................................4Risk and Security concerns of Ransomware.........................................................................5Strategies for addressing them................................................................................................7Conclusion and Future Trends...............................................................................................9Reference.................................................................................................................................10

3IT SecurityIntroductionIT security is a practice of preventing unauthorized access to organization’s server,files or individual PCs. The attackers or hackers have attacked the system through differenttypes of malware and virus which have affected the organizations data. The attacker ofhackers can gain the access through malware, which includes virus, spyware, worms andothers. These code are installed in the system to steam information, access files and blockthem till the time an amount is paid to recover the encryption key. The first attack happenedin 1988 to healthcare industry and till today healthcare industry is one main targeted industry.Organizations are taking several steps to protect their system and server from the malwareattacks. A huge amount of money is been spent every year to protect their systems and files.Each anti-virus needs to be update every year to add the details of extension of new virus andmalware which are been identified by the IT security specialists. This report focuses aboutthe ransom ware background and their attack history. This report also focuses on the fact thatwhy Information security is important and how effectively it can be done.In recent times, there has been an increase in the number of ransom ware attacks thathappens in the world. It is important that different stakeholders must join hands so that theransom ware attacks can be managed. It can be said that one of the major threat to the largeIT systems is the threat from ransomware. The large IT systems like ERP systems should beprotected from any external attack. This paper would discuss the background of ransomwareand the strategies that should be used to manage the attack of ransomware. It would becorrect to say that the proactive ways of protection is better than the reactive way ofprotection in case of ransomware.

4IT SecurityBackground - Ransom wareRansom ware can be defined as a type of malware, which prevents the access of theirsystem either by locking the system screen or by locking the user files unless a ransom ispaid. Generally ransom ware families are categorized as crypto-ransom ware, the virusencrypt few file types on infected system and compel the user to pay the some amountthrough online payment to decrypt the files.The price of ransom vary on the variant of ransomware, the very common specifyransom payment is usually. During the recent attack of ransom ware there were somealternative payment options as well such as iTunes and Amazon gift cards etc. In some case,the decryption key or unlock tool is not ensure even after getting the desired ransom. Since2000s, ransomware has been a threat to enterprises, server message blocks (SMBs) andindividuals. More than 7600 ransomware attacks has been reported to Internet CrimeComplaints between 2005 to March 2016. It was reported that in 2015, more than 2453ransomware complaints have been received and costed over $1.6 million to its victims. Theactual number might be more be much higher than actually reported. In 1989 firstransomware attack occurred targeting the healthcare industry. Since then, healthcare is one ofthe top target industries for ransomware attack (Savage, Coogan, & Lau, 2015). Early malwaredeveloper used to write their own encryption code but today’s attackers are relying on “offthe shelf libraries that significantly become harder to crack”. Some attackers develop thetoolkit that can be downloaded and deployed by the developer with less technical skills. In2011, a ransomware was introduced that imitate the windows product activation which mademore difficult for the user to de-code the genuine notification from threats (Kharraz,Robertson, Balzarotti, Bilge, & Kirda, 2015).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware and Its Impact on Society
|8
|2495
|62

Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

The Age of Ransomware | Understanding Ransomware
|11
|2690
|51

Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

Understanding Ransomware Attack and Fence Register in Operating System
|16
|3404
|318

Computer Security Report 2022
|14
|3515
|48