logo

Contemporary Computer Security Issues | Study

   

Added on  2022-09-07

13 Pages2399 Words19 Views
Disease and Disorders
 | 
 | 
 | 
Running head: CONTEMPORARY COMPUTER SECURITY ISSUES
CONTEMPORARY COMPUTER SECURITY ISSUES
Name of the Student:
Name of the university:
Author’s Note:
Contemporary Computer Security Issues | Study_1

CONTEMPORARY COMPUTER SECURITY ISSUES
1
Table of Contents
Introduction:-...................................................................................................................................2
Task 1 Toll group Ransomware Attack:-.....................................................................................3
Background:-...........................................................................................................................3
Impact:-....................................................................................................................................3
Aims: -.....................................................................................................................................3
Specific Action:-......................................................................................................................4
Details:-....................................................................................................................................4
Opinion:-..................................................................................................................................6
Task 2:- Champaign-Urbana Public-Health District...................................................................7
Background:-...........................................................................................................................7
Impact:-....................................................................................................................................7
Aims:-......................................................................................................................................8
Specific action:-.......................................................................................................................8
Details:-....................................................................................................................................9
Summary:-.....................................................................................................................................11
References:-...................................................................................................................................12
Contemporary Computer Security Issues | Study_2

CONTEMPORARY COMPUTER SECURITY ISSUES
2
Introduction:-
The word "Ransomware" is a category of malware from crypto virology that impends to
distribute the victim's documents or continually block access to it without payment is paid.
Ransomware enters any user network in a variety of techniques, and the most prevalent is a
download through a junk email content. The download then implements the ransomware
sequencer that attacks any network system. In this report are describe one specific type of
ransomware which named net walker or "mailto". Two prominent organizations are recently
affected by this ransomware. In this report are mainly focused on two organization who are
suffered from this dangerous attack in recent time.
Task 1 Toll group Ransomware Attack:-
Background:-
This attack occurs in 2nd February 2020, and the specific name of this attack is net-walker
or mailto ransomware attack. The logistics authority declared on this day that its recovery
involved a synchronized effort between several parties, in part to deliver declaration that it had
destroyed the malware. The malware is assumed to have harmed up to 950-1050 servers,
impacting around 500 business applications and cooperating critical systems counting Active
Directory.
Impact:-
For this attack Toll group purposefully shut down several systems across several sites and
commercial units to cover the ransomware. For this attack the organization was forced to
provisionally immobilize its online booking system, returning to phone booking.
Contemporary Computer Security Issues | Study_3

CONTEMPORARY COMPUTER SECURITY ISSUES
3
Aims: -
Research says that this attack is very comparable to several targeted ransomware attacks
intended at businesses that trust on knowledge to distribute time-sensitive, critical facilities or
goods (Scaife et al., 2016). By purposefully targeting companies that cannot control well with
any interruption, these cyber offenders exploit the probabilities that their victims will
recompense the ransom to improve their facilities. Healthcare establishments, local and state
government, manufacturing control systems and now delivery businesses characterize ripe
targets for these intensive ransomware operations.
Specific Action:-
This organization maintains some fundamental criteria to defend this type of attacks.
They keep their antivirus software and other safety tools launched on the devices updated for
recognition and anticipation of the range of Mailto ransomware (Less et al., 2019). This
organization apply content screens on messages in boxes to avoid hateful content from reaching
operators and thus dropping the prospect of a potential compromise. Toll group Patch their
system servers regularly to control the movement of the attack within a network and bound the
number of hosts obstructed post-effective infection. Toll group also apply network separation to
partition the more significant networks into lesser sections for separating infrastructures between
particular services and hosts. The toll group trained their workers and operators to progress
cyber-security consciousness and create them cyber ready.
Details:-
This attack has become dynamic recently as it aims to affect the government agencies and
enterprise. Net Walker ransomware was revealed in August 2019. Net Walker settles the network
and encodes every Windows devices linked to it. The hacker applies a method named “Process
Contemporary Computer Security Issues | Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware Attack and its Impact
|13
|2416
|74

IS security and Risk Management
|16
|4607
|284

Contemporary Cyber Security Issues
|14
|2593
|52

Ransomware & Malware
|5
|581
|276

Malware Research Analysis 2022
|6
|1205
|19

IT Security Risks and Securities of Ransomware
|14
|2848
|75