Contemporary Cyber Security Issues
Added on 2023-01-05
14 Pages2593 Words52 Views
Materials Science and EngineeringPolitical Science
|
|
|
Running head: CONTEMPORARY CYBER SECURITY ISSUSES
CONTEMPORARY CYBER SECURITY ISSUSES
Name of the Student
Name of the University
Author note
CONTEMPORARY CYBER SECURITY ISSUSES
Name of the Student
Name of the University
Author note
![Contemporary Cyber Security Issues_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Feg%2F57490012b77a4879b44743790bac38dc.jpg&w=3840&q=10)
CONTEMPORARY CYBER SECURITY ISSUSES
Table of Contents
Introduction: 2
Discussion: 2
Chosen Malware type- Ramsomware: 2
When did the malware attack occur and was it given a specific name? 4
Outcome of the incident: 6
The impact of the incident: 8
Security breached and the resultant consequences: 8
Security actions taken by the organizations: 9
Conclusion: 11
References: 12
Table of Contents
Introduction: 2
Discussion: 2
Chosen Malware type- Ramsomware: 2
When did the malware attack occur and was it given a specific name? 4
Outcome of the incident: 6
The impact of the incident: 8
Security breached and the resultant consequences: 8
Security actions taken by the organizations: 9
Conclusion: 11
References: 12
![Contemporary Cyber Security Issues_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fsi%2Fc583bb8c71f7432a885bff14c856da19.jpg&w=3840&q=10)
CONTEMPORARY CYBER SECURITY ISSUSES
Introduction:
The aim of the report is to evaluate the Contemporary cyber security issues that are
faced by the whole world and has impacted on the organizations and their work structures.
The impact of contemporary computer applications is typically seen by 5 fundamental
characteristics, such as accessibility, precision, authenticity, confidentiality and integrity, of
safe computer and information systems. The ideas usually apply to government, enterprise,
education and private individuals ' normal lives (Kharraz et al., 2015). Normally expanded
internet apps are considered–hence the name has been kept "cybersecurity." It is a complex
method to achieve and ensure a safe cyberspace and that some of the issues are based
on personal identity, confidentiality, intellectual property, critical infrastructure and
organizational sustainability.
Despite a risk of viruses and malware almost from the early days of computer
technology, hackers have been given a real chance to test their ability by exposing so many
devices in the web–by shattering websites, robbing information, or fraud (Brewer, 2016). In
fact, hackers have been able to use their computer systems to ensure their safety and sanctity.
This is what cybercrime is termed.
Discussion:
Chosen Malware type- Ramsomware:
Ransomware is a type of malware that encrypts the documents of the victim. The
assailant then requests the recipient to pay for access to information. Directions for paying a
premium for the encryption key are sent out to users. The cost in Bitcoin can vary from a few
hundred dollars to thousands.
Introduction:
The aim of the report is to evaluate the Contemporary cyber security issues that are
faced by the whole world and has impacted on the organizations and their work structures.
The impact of contemporary computer applications is typically seen by 5 fundamental
characteristics, such as accessibility, precision, authenticity, confidentiality and integrity, of
safe computer and information systems. The ideas usually apply to government, enterprise,
education and private individuals ' normal lives (Kharraz et al., 2015). Normally expanded
internet apps are considered–hence the name has been kept "cybersecurity." It is a complex
method to achieve and ensure a safe cyberspace and that some of the issues are based
on personal identity, confidentiality, intellectual property, critical infrastructure and
organizational sustainability.
Despite a risk of viruses and malware almost from the early days of computer
technology, hackers have been given a real chance to test their ability by exposing so many
devices in the web–by shattering websites, robbing information, or fraud (Brewer, 2016). In
fact, hackers have been able to use their computer systems to ensure their safety and sanctity.
This is what cybercrime is termed.
Discussion:
Chosen Malware type- Ramsomware:
Ransomware is a type of malware that encrypts the documents of the victim. The
assailant then requests the recipient to pay for access to information. Directions for paying a
premium for the encryption key are sent out to users. The cost in Bitcoin can vary from a few
hundred dollars to thousands.
![Contemporary Cyber Security Issues_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fwr%2F07cc3e4ac2864a129e510f3ac3fa656b.jpg&w=3840&q=10)
CONTEMPORARY CYBER SECURITY ISSUSES
It is possible to access a laptop using several ransomware vectors. Phishing malware
— attachments that reach the victim through an email, masking as a file, is one of the most
popular delivery technologies. They can take over the laptop of the victim once they are
downloaded and opened, particularly when they have integrated-in social engineering
instruments that trick consumers to enable administrative access. Some other, more
aggressive ransomware types, such as NotPetya, use security holes to infect pcs without
tricking users (Sittig & Singh, 2016).
(Figure 1: Ransomware procedure)
Source: Brewer, 2016)
There are a few things the malware might do once it's taken over the victim's
computer, but by far the most common action is to encrypt some or all of the user's files. If
they want technical information, the Infosec Institute looks closely at how a variety of
ransomware documents are encrypted (Tuttle, 2016). But perhaps the most important thing to
understand would be that the files cannot be decrypted at the end of the process without a
math key that the attacker alone knows. The user is provided with a notification that his files
It is possible to access a laptop using several ransomware vectors. Phishing malware
— attachments that reach the victim through an email, masking as a file, is one of the most
popular delivery technologies. They can take over the laptop of the victim once they are
downloaded and opened, particularly when they have integrated-in social engineering
instruments that trick consumers to enable administrative access. Some other, more
aggressive ransomware types, such as NotPetya, use security holes to infect pcs without
tricking users (Sittig & Singh, 2016).
(Figure 1: Ransomware procedure)
Source: Brewer, 2016)
There are a few things the malware might do once it's taken over the victim's
computer, but by far the most common action is to encrypt some or all of the user's files. If
they want technical information, the Infosec Institute looks closely at how a variety of
ransomware documents are encrypted (Tuttle, 2016). But perhaps the most important thing to
understand would be that the files cannot be decrypted at the end of the process without a
math key that the attacker alone knows. The user is provided with a notification that his files
![Contemporary Cyber Security Issues_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fqr%2F565de632eae84883869afbbce106a4f7.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Ransomware and Its Impact on Societylg...
|8
|2495
|62
Ransomware Malware: A Walkthrough and Real World Examplelg...
|5
|1180
|59
DDOS and Ransomware - Deskliblg...
|4
|739
|285
Ransomware & Malwarelg...
|5
|581
|276
Assignment on CYBER SECURITY: WannaCry Attacklg...
|12
|2488
|20
Security Concerns of Ransomwarelg...
|13
|2895
|140