logo

Computer Security Report 2022

14 Pages3515 Words48 Views
   

Added on  2022-10-03

Computer Security Report 2022

   Added on 2022-10-03

ShareRelated Documents
COMPUTER SECURITY 0
Ransomware Attack
Computer  Security  Report  2022_1
COMPUTER SECURITY 1
Executive Summary
Ransomware is a fragment of a malware attack that occurs in the computer
networks and devices and impacts on the private details of the
organizations. WannaCry is one of the leading ransomware attacks in the
history of security threats that enter into the system and encrypt the
databases of the organizations. This proposed report focuses on the current
scenarios regards to ransomware attacks along with their working
principles. It is identified that WannaCry and Cryptojacking both are
common forms of ransomware that hacked thousands of computer devices
in the last three years. This research shows how the criminals perform
malicious and ransomware activities in the companies and identifies the
preventions techniques for addressing such kind of security attack.
Therefore, it is suggested that the organizations can implement security
policies, provide training to the employees and involve firewall tools along
with the encryption technique for reducing the rate of a ransomware attack.
Computer  Security  Report  2022_2
COMPUTER SECURITY 2
Table of Contents
Executive Summary................................................................................................... 1
Introduction................................................................................................................ 3
Ransomware attack.................................................................................................... 3
The working mechanism of a ransomware attack......................................................5
Current scenarios regard to Ransomware..................................................................5
Preventions techniques and steps..............................................................................8
Use authentic networks........................................................................................... 8
Design and implement security policies..................................................................8
Use backup plans.................................................................................................... 9
Provide training and education to the employees...................................................9
Use firewall and antiviruses.................................................................................... 9
Use encryption technique........................................................................................ 9
Conclusion................................................................................................................ 10
References............................................................................................................... 11
Computer  Security  Report  2022_3
COMPUTER SECURITY 3
Introduction
Ransomware is defined as wicked software which is mainly developed to
deny access to the computer networks till a ransom is compensated by the
victim. It is one of the common forms of cyber-attacks that have the ability
to obtain sensitive data of consumers and organizations (Mohurle, and Patil,
2017). In this generation, the rate of security attacks is growing rapidly but
ransomware is a severe attack that demands ransom from the consumers in
order to decrypt their data files. The goal of this investigation is to inspect
the key features of ransomware and describe current scenarios regarding
the ransomware. It is observed that most of the criminals use malware tools
for performing ransomware activities and hacking-related processes. This
report will cover the concept of a ransomware attack, working principles,
recent ransomware attacks and recommendations for the organizations.
Ransomware attack
The term ransomware is a part of wicked software which is used by the
hackers for attacking on the computing networks used by the companies. It
has the ability to reduce the performance of computing devices and collect
all reliable data of the organizations without taking their permission
(Brewer, 2016). In which the hackers handover the unsolicited indications
to the operator’s networks and block communication channels for entering
into the main server. Most of the criminals encode the data files of
consumers and demand some ransom to decrypt their sensitive files. It is
identified that such kind of computer attack is conceded out with the
assistance of Trojan process that focuses on the computing networks and
servers utilised by the companies. A latest study observed that the rate of a
ransomware attack is growing quickly that target the computer devices and
send spam emails to the consumers for accessing their privacy along with
the personal accounts. One of the most communal methods used by the
Computer  Security  Report  2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Cyber Security WannCry Attack Case Study 2022
|11
|2314
|16

IS Security and Risk Management: Telstra Corporation Ltd
|17
|3798
|88

Ransomware & Malware
|5
|581
|276

(PDF) Overview of Cyber Security
|8
|1545
|60

Ransomware and Its Impact on Society
|8
|2495
|62