logo

(PDF) Overview of Cyber Security

8 Pages1545 Words60 Views
   

Added on  2021-05-31

(PDF) Overview of Cyber Security

   Added on 2021-05-31

ShareRelated Documents
A REPORT ONCYBER SECURITYINCIDENTS
(PDF) Overview of Cyber Security_1
IntroductionCyber security is a set of techniques which protects computer and network system fromthreats and attacks. These attacks mainly aim at manipulating the sensitive information, ordestroying the data, or stealing the confidential information. With the growing digital world,there are various threats evolving. These threats which not only bypass the firewall but alsoshuts down the system.. Some of the recent cyber security incidents are: 1.What is Cryptolocker?Cryptolocker is a type of ransomware which targets only Microsoft running windowsoperating system. Cyrptolocker assault happened in from 5 September 2013 to latemay 2014. Ransomware typically propagates through an innocent looking email as anattachment sent from a authorised company. Within this mail ransomware file isnamed as pdf file to fool the user. Once the cryptolocker file executes it targetsvarious system files and resulting in encryption of all files. Once the encryption isdone, the display shows message with high ransom to pay to decrypt the file.How the cryptolocker affected the files and modus operandi used by attacker?Cryptolocker is a type of advance software program which propagates into user’ssystem through an email attachment or through any backdoor vulnerability, by thenstarts encrypting the files of different types without being known to the owner. Thissoftware program connects to its central server and starts encryption using RSAalgorithm called as asymmetric cryptography also called as open key cryptography..The hacker keeps the private key in their central server and without using user can’tget access into his PC. (Ducklin, 2013, p.6) After full encryption it locks down thesystem and display message comes with a ransom to pay in the form of bitcoinswithin a stipulated time. They fear out the user, if the ransom is not paid to them they
(PDF) Overview of Cyber Security_2
will delete the private key or they will delete the data. In fact paying does notguarantee that they will do the decryption process. By then the most ideal approach tounravel the data is by online master association which will cost them extensivelymore in higher bitcoins. (Wikipedia, 2018, p.6)Following diagram shows the modus operandi used by attacker:(Anonymous, 2015, p.4)2.What is WannaCry attack?WannaCry is a type of ransomware which occurred in May 2017 worldwide leavingthe most of the systems affected. It targeted Microsoft running operating system byencrypting the sensitive information and demanding ransom for decrypting the data.Initially it started in Asia at morning 7 O’clock and by affecting the vulnerable SMBport and within a day spreading to almost 2 lakhs system covering over 150 countries.These ransomware spreads itself through the network. It is also called as networkworm which travels through other application programs and when it reaches the PC itextracts itself. (Wikipedia, 2018, p.6)How WannaCry expands itself over the network? (Ehrenfeld, 2017, p.6)
(PDF) Overview of Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security: Types, Working Mechanism, Threats, Mitigation Tools
|9
|1863
|305

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Potential Threats and Mitigation Tools for Ransomware
|10
|2689
|368

IT Security Management
|12
|2958
|324

IT Security: WannaCry Ransomware Attack
|12
|3038
|37

Ransomware and Its Impact on Society
|8
|2495
|62