logo

Disaster Recovery Plan - Ransomware

   

Added on  2023-04-11

4 Pages1258 Words147 Views
Middlesex University, London
Group Presentation

CCE 3070 NETWORK MANAGEMENT

Disaster Recovery Plan - Ransomware

Abstract1
The Ransomware attach is becoming prevalent now a days. One of the major reasons of this boost in
the ransomware attacks is it has proven effective in most of the previous experiences. It can be easily
evident from the ransomware attack of 2016 in Los Angeles in the Hollywood Presbyterian Medical
Center. As ransomware is proving to be a amazing successful strategy to extract money from
corporates, it is expected to hike in the coming future years. Keeping in mind, the severity of the
damage caused by this attack, the businesses must be capable to defend against these kinds of
malicious attacks. Some important key points which needs to be followed during this situation are
discussed in this paper.

Introduction

Ransomware

Ransomware refers to a malicious computer disaster in which a cyber hacker may infect any computer
network or any device with harmful software. Generally, the malicious code scripts are attached with
some e-mails or some legitimate software that are being downloaded from any website. Once being
downloaded, the code propagates in our system and then encrypt our precious data and then contact
the owner with an offer for paying some ransom to retrieve his data back.

Types of ransomwares2

Ransomware attacks can be broadly classified into two categories:

1. Crypto Ransomware

2. Locker Ransomware

Crypto Ransomware:

It is the most sophisticated type of computer attack. The attackers often encrypt our critical
information and after that put a demand for ransom from the owner, usually with a countdown threat.
Out of total ransomware attacks, 64% attacks are crypto attacks. It generally targets the system files
and the data available on the device. As a result, the system is functional, but is not able to access the
files that have been encrypted by the code.

Locker Ransomware:

As compared to the crypto ransomware attack, it is a simpler one. The malicious code disables few or
complete data of the system’s functionality. The files are not typically encrypted, but the access is
denied. Till date, 36% ransomware attacks belong to this category. The victim is being prevented from
accessing the system by putting lock on some components or the entire device.

How does ransomware propagate in the system?[5]

1. The spammed message with a malicious attachment is received by the user.

2. Attachment acts as the downloader for malware which connects to URLs responsible for
hosting the crypto files attached.

3. Downloading of the crypto files of the ransomware in the system takes place automatically.

4. The encryption of system and data files in the device takes place.

1 Keep-it-safe ransomware recovery report

2
Johansson, K.H., H. Amin and Sandberg, 2015. Cyber-physical security in networked control systems: An
introduction to the issue. IEEE Control Systems Magazine, 35(1), pp.20-23

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security: Types, Working Mechanism, Threats, Mitigation Tools
|9
|1863
|305

Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500

Malware Research Analysis 2022
|6
|1205
|19

Ransomware: Variants, Working Mechanism, Potential Threats, Mitigation Tools and Recent Attack
|9
|2142
|102

Ransomware & Malware
|5
|581
|276

Security threats Assignment PDF
|17
|5254
|133