logo

Ransomware & Malware

5 Pages581 Words276 Views
   

Added on  2022-12-09

About This Document

This essay examines the ransomware cyber-security attack and evaluates its impacts on companies and private details. It discusses the working principles of ransomware malware attack and suggests steps to reduce the problem. Various types of ransomware attacks are also explored.

Ransomware & Malware

   Added on 2022-12-09

ShareRelated Documents
CYBERSECURITY THREATS 0
Ransomware &
Malware
Ransomware & Malware_1
CYBERSECURITY THREATS 1
Introduction
Ransomware is one of the common kinds of cyber security attack
which is a part of malware attack that targets the personal information of
consumers. Due to increment in the information technologies numbers of
users and companies are using internet-based servers which are associated
with the security threats. The aim of this essay is to examine the
ransomware cyber-security attack and evaluate their impacts on companies
and private details.
Ransomware attack
The term Ransomware refers to the malware attack that attacks on
the user’s networks and devices from the perspective of hacking. It is one of
the common and effective kinds of security risks which are increasing very
fast that encrypt the private details of consumers and organizations
(Malware Bytes, 2018). It is observed that ransomware attack is mainly
carried out with the help of a Trojan which is disguised as a legitimate file
that consumer is tricked into downloading when it comes as an email
attachment.
In which the hackers attack on the computer networks and servers
used by the companies and reduce their performance for obtaining the
private details of employees and users. After that hackers encrypt the
collected files and demand a ransom to restore back their personal files. A
recent study identified that ransomware malware attack can be spread from
one system to another which directly impact on the user’s data and
information (Masergy, 2019). In which the hackers produce a large number
of unwanted signals and transfer to the networks used by companies and
these fraud signals helps them for reducing the security of computer
systems used by employees.
Ransomware & Malware_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Article 2022
|5
|1172
|24

Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Cyber Security WannCry Attack Case Study 2022
|11
|2314
|16

Cyber security Attacks | Assessment 1
|7
|1374
|30

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Security and Risk Management Assignment 2022
|12
|2790
|15