logo

Contemporary Cyber Security Issues

   

Added on  2023-01-05

14 Pages2593 Words52 Views
Materials Science and EngineeringPolitical Science
 | 
 | 
 | 
Running head: CONTEMPORARY CYBER SECURITY ISSUSES
CONTEMPORARY CYBER SECURITY ISSUSES
Name of the Student
Name of the University
Author note
Contemporary Cyber Security Issues_1

CONTEMPORARY CYBER SECURITY ISSUSES
Table of Contents
Introduction: 2
Discussion: 2
Chosen Malware type- Ramsomware: 2
When did the malware attack occur and was it given a specific name? 4
Outcome of the incident: 6
The impact of the incident: 8
Security breached and the resultant consequences: 8
Security actions taken by the organizations: 9
Conclusion: 11
References: 12
Contemporary Cyber Security Issues_2

CONTEMPORARY CYBER SECURITY ISSUSES
Introduction:
The aim of the report is to evaluate the Contemporary cyber security issues that are
faced by the whole world and has impacted on the organizations and their work structures.
The impact of contemporary computer applications is typically seen by 5 fundamental
characteristics, such as accessibility, precision, authenticity, confidentiality and integrity, of
safe computer and information systems. The ideas usually apply to government, enterprise,
education and private individuals ' normal lives (Kharraz et al., 2015). Normally expanded
internet apps are considered–hence the name has been kept "cybersecurity." It is a complex
method to achieve and ensure a safe cyberspace and that some of the issues are based
on personal identity, confidentiality, intellectual property, critical infrastructure and
organizational sustainability.
Despite a risk of viruses and malware almost from the early days of computer
technology, hackers have been given a real chance to test their ability by exposing so many
devices in the web–by shattering websites, robbing information, or fraud (Brewer, 2016). In
fact, hackers have been able to use their computer systems to ensure their safety and sanctity.
This is what cybercrime is termed.
Discussion:
Chosen Malware type- Ramsomware:
Ransomware is a type of malware that encrypts the documents of the victim. The
assailant then requests the recipient to pay for access to information. Directions for paying a
premium for the encryption key are sent out to users. The cost in Bitcoin can vary from a few
hundred dollars to thousands.
Contemporary Cyber Security Issues_3

CONTEMPORARY CYBER SECURITY ISSUSES
It is possible to access a laptop using several ransomware vectors. Phishing malware
— attachments that reach the victim through an email, masking as a file, is one of the most
popular delivery technologies. They can take over the laptop of the victim once they are
downloaded and opened, particularly when they have integrated-in social engineering
instruments that trick consumers to enable administrative access. Some other, more
aggressive ransomware types, such as NotPetya, use security holes to infect pcs without
tricking users (Sittig & Singh, 2016).
(Figure 1: Ransomware procedure)
Source: Brewer, 2016)
There are a few things the malware might do once it's taken over the victim's
computer, but by far the most common action is to encrypt some or all of the user's files. If
they want technical information, the Infosec Institute looks closely at how a variety of
ransomware documents are encrypted (Tuttle, 2016). But perhaps the most important thing to
understand would be that the files cannot be decrypted at the end of the process without a
math key that the attacker alone knows. The user is provided with a notification that his files
Contemporary Cyber Security Issues_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware and Its Impact on Society
|8
|2495
|62

Ransomware Malware: A Walkthrough and Real World Example
|5
|1180
|59

DDOS and Ransomware - Desklib
|4
|739
|285

Ransomware & Malware
|5
|581
|276

Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Security Concerns of Ransomware
|13
|2895
|140