logo

Cyber Crime- Ransomware Malware

14 Pages3698 Words387 Views
   

Added on  2019-09-18

Cyber Crime- Ransomware Malware

   Added on 2019-09-18

ShareRelated Documents
Running Head: Cyber CrimeCYBER CRIME[Document subtitle]
Cyber Crime- Ransomware Malware_1
Cyber Crime1Table of ContentsIntroduction......................................................................................................................................1Part A...............................................................................................................................................1How Ransomware Malware attack can happen to network attached backup system..................1Methods used by Ransomware Malware for the attack...............................................................2Part B...............................................................................................................................................4Part C...............................................................................................................................................6Part D...............................................................................................................................................8Conclusion.....................................................................................................................................10References......................................................................................................................................11
Cyber Crime- Ransomware Malware_2
Cyber Crime2Introduction In this paper, we are studied about the Ransomware Malware. Generally, it is said that the Ransomware is a computer malware in which rogue software code effectively holds a user’s computer hostage until a “ransom” fee is paid. The scenario that has been selected to discuss the Ransomware Malware is encryption of the network attached backup system. This paper is focused on different elements of the Ransomware Malware. For example, it defines how the Ransomware attack happens in IT or other companies. It is defined one or more methods used for the attack. On the other hand, the laws that are broken by crypto Ransomware also discussed to aware the target audience about effects of illegal attacks of malware. Therefore, with the help of this knowledge, the target audience can learn a lot of knowledge about different aspects of Ransomware malware and pay a significant contribution towards the management of their IT networks. The Ransomware malware has enough potential to influence the stored data and other backup systems in a negative manner. The knowledge of Ransomware malware will help them intheir career because they can apply their practical knowledge to save systems from any unrecognized attack.Part A How Ransomware Malware attack can happen to network attached backup systemDuggan (2017) Ransomware Malware influences the existing network-attached backup system of different IT organizations in a significant manner. The cyber extortionists know that backups are their most important enemy in fulfilling their desired objectives and are adapting their Ransomware to look for them. So, the priority focus of Ransomware malware is towards encryption of the backup files. It is done with the purpose of preventing different clients from
Cyber Crime- Ransomware Malware_3
Cyber Crime3accessing their backup data and saving themselves from fine. The first and foremost step of Ransomware Malware is to destroy Shadow copy and restore point data on Windows Systems. This performed by the different Ransomware families who are operating the malware the special motive to gain significant monetary profit. After planning of an attack on Shadow copy and restore point data, it targets all attached drives and happens to encrypt the backups as well, though not likely by design. The presence of Ransomware Malware encrypts each files system that is attached to an infected machine. This situation might prove vulnerable for a client. Apart from this, the presence of Ransomware Malware also influenced the external hard drives and plugged-in USB sticks (Collier, 2017). Therefore, it is right to say that the Ransomware Malwarecomes in different forms and influence the network attached backup system in a significant manner. There are a lot of business houses who becomes failure to test their backups properly. The main reason behind the attack of Ransomware Malware is that most of the business firms and other small level clients did not have a recent test of their recovery process. They are engaged in doing backups, but they do not have any information about how they can recover it. So, it becomes essential for the business firms to have knowledge about network attached backupsystem and prevent Ransomware Malware attack significantly.Methods used by Ransomware Malware for the attack Ransomware used a large number of methods to attack personal information of an organization. Some of the popular and common methods used by Ransomware for attack purpose includes following: Exploit KitsThe first and foremost method used by Ransomware for the attack is exploiting kit. This method is a combination of different sophisticated and important tools that exploit vulnerabilities. The
Cyber Crime- Ransomware Malware_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Paper on Ransomware Malware Cyber Crime
|5
|1671
|302

Cyber Computer Crime Assignment 2022
|4
|618
|17

Malware Research Analysis 2022
|6
|1205
|19

Ransomware & Malware
|5
|581
|276

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Ransomware and Its Impact on Society
|8
|2495
|62