logo

DATA SAFETY CONSIDERING RANSOMWARE.

   

Added on  2022-11-14

16 Pages3563 Words4 Views
Running head: DATA SAFETY CONSIDERING RANSOMWARE
Data safety considering Ransomware
Name of the Student
Name of the University
Author Note:

DATA SAFETY CONSIDERING RANSOMWARE
1
Table of Contents
Introduction......................................................................................................................................2
Example 1: Tesla Crypt...................................................................................................................3
Example 2: Simple Locker..............................................................................................................5
Example 3: Wanna Cry ransomeware attack...................................................................................8
Recommendations..........................................................................................................................10
Conclusion.....................................................................................................................................11
Reference.......................................................................................................................................13

DATA SAFETY CONSIDERING RANSOMWARE
2
Topic: With so much discussion about ransomware in the media in recent times, discuss
how safe our data is right now. Use high profile examples from the past 5 years to support
your position.
Introduction
Data is considered as an asset in most of the commercial enterprises these days, at the
same time it can also be said that the data security is a huge concern in our society as well.
However, it can be said that there are lots of data security challenges which exists these days
such as the authorized data access and the data alteration (Javed et al. 2019). Data protection is a
very important factor as it is responsible for profit and loss of commercial organization where
data is considered as an asset. The different aspects of data security are user authentication, data
encryption and data erasure. Data plays a huge role to maintain business reputation in most of the
commercial organizations. Adequate security measures are needed to secure the organization
data from the threats coming from both inside as well from outside the organization (Kamoun
and Nicho 2018). The threats coming outside the organization in terms of the cyber security will
be evaluated in this paper. Based on the external threats such as the threat coming from cyber
security issues such as Ramsomware it can be said that the data which are used in our society as
well as the data which are transported from one place to the other are not very much safe (Hong
2018). Any kinds of data manipulation as well as data alteration can have a huge impact in most
of the commercial organizations.
Inspite of the International data protection rules and regulations such as the General
Data Protection Regulation which was enacted in the year 2016, it can be said that the social
engineers are also enhancing their actions and strategies to encrypt the business data. Social
engineers from all over the world are using advanced encryption technique to encrypt different

DATA SAFETY CONSIDERING RANSOMWARE
3
types of data such as the business data, organizational data as well as the organizational data. The
average cost of securing any data in a cloud servers such as Amazon Web Services is also
increasing each day.
It can be said that there are different types of data threats such as the computer viruses,
rogue security software, spyware and adware, computer worms, cyber security threats such as
ransomeware, DDoS attacks, phishing emails, Rootkit. Network security threats are also
increasing each day due to the presence of harmful viruses such as the Trojan horse and the SQL
injection attack (Piper 2018). There are different ransomeware attack which occurred in the last 5
years which had a direct impact on the data security. The following unit of the paper will be
describing each of the 5 examples in a detailed manner.
Example 1: Tesla Crypt
Classification: Is can be defined as a category of ransomeware Trojan. This harmful
virus was created independently. Wide range of encryption techniques were used by this harmful
virus during this ransomeware attack.
Platform of the attack: One of the most significant platform which were used in this
ransomware attack is the Angler Adobe Flash. The security vulnerabilities as well as the
loopholes of the Angler Adobe Flash were utilized by the social engineers of this ransomeware
attack. Both symmetric as well as the asymmetric data encryption techniques were used in this
ransomeware attack (Russo et al. 2016). Security vulnerabilities of Kaspersky which is one of
the most reputed anti-virus software applications were also capitalized by the social engineers of
the Tesla Crypt.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Safety considering Ransomware
|17
|3925
|407

Network security - Sample Assignment
|10
|2195
|122

IT Security Risks and Securities of Ransomware
|14
|2848
|75

Disaster Recovery Plan - Ransomware
|4
|1258
|147

Big Data Security - Report
|8
|2458
|13

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
|5
|1404
|493