logo

Information Security in an Organization

12 Pages2808 Words45 Views
   

Added on  2020-02-24

Information Security in an Organization

   Added on 2020-02-24

ShareRelated Documents
Running head: INFORMATION SECURITYINFORMATION SECURITYName of the Student:Name of the University:Author note:
Information Security in an Organization_1
2INFORMATION SECURITYTable of ContentsPart A...............................................................................................................................................3Introduction..................................................................................................................................3Problem........................................................................................................................................4How and why it occurred.............................................................................................................4Possible Solution.........................................................................................................................5Conclusion...................................................................................................................................6References........................................................................................................................................7Part B...............................................................................................................................................8Introduction..................................................................................................................................8Problem........................................................................................................................................9Effects..........................................................................................................................................9Working.....................................................................................................................................10Prevention..................................................................................................................................10Conclusion.................................................................................................................................11References......................................................................................................................................12
Information Security in an Organization_2
3INFORMATION SECURITYPart AIntroductionOn 27th June 2017, a global cyber attack called Petya affected a wide range oforganization sectors like media, telecom, transportation, power. Petya it also known asPetwrap, NotPetya, Petna, Golden eye. The main intention behind this is to encrypt thecomputers and demand a ransom. This ransomware is similar to wannacry ransomware attackthat took place in May 2017(Akkas, Chachamis & Fetahu, 2017). This ransomware affected the countries like United States, Netherland, France,India, Spain and Russia and Ukraine. Ukraine is mainly affected as it uses auto updatefeature of a software name M.E.Doc which is used for tax calculation of any firmworking in this country. It also affected the security system of banks, energy companies,and government agencies (Batcheller et al., 2017). Certain preventive measure has been taken by organization to reduce risk ofmalware. Each organization should have a security awareness-training program for theiremployees to minimize the effect of ransomware (Choi, Scott & LeClair, 2016).
Information Security in an Organization_3
4INFORMATION SECURITYProblemOn the 27th June 2017 Petya ransomware came into action by encrypting computersfrom all across the globe. Petya is also known as Petwrap, Notpetya and GoldenEye insome of the countries. Petya mainly affected certain sectors like financial services,telecom and government agencies (Batcheller et al., 2017). Among all the countries fromthe globe Ukraine has been affected the most. It has got the hardest hit among all thenation due to the use of an auto update feature of M.E.Doc software. This particularsoftware is mainly used for tax calculation of various firms operating in Ukraine (Choi,Scott & LeClair, 2016). This attack mainly affected the banks, government agencies, mediaoutlets operating in Ukraine. On comparison to wannacry ransomware petya has a lessimpact on the various systems. Petya has several windows hacking tools like PsExec andWMIC which is used to gather important information from the infected system(Akkas,Chachamis & Fetahu, 2017). When a system is affected by Petya malware then it does notboot to windows, instead of that it shows a message with content that the user files areno longer accessible as they have been encrypted and nobody can recover the files untiland unless ransom is provided to them. (Ivanova, 2017). How and why it occurredIt is a second cyber attack after WannaCry breakout in May 2017. It has somecharacteristic similar to wannacry ransomware. Petya use more sophisticated method thanwannacry ransomware (Batcheller et al., 2017). Petya used some windows administrationtools like PsExec and WMIC for its impact on the various people of the world. This attackwas mainly used to permanently encrypt all the data on an infected system. Themalware was designed in such way that even if the victim pays the ransom, the data
Information Security in an Organization_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

ITC595 Information Security
|12
|2472
|132

CSI2102 - The Ransomware Virus | Information Security
|9
|1696
|28

ITC595 - Information Security | Cyber attack
|13
|2565
|126

Assignment on Ransomware and Cyber Security
|3
|419
|62

Potential Threats and Mitigation Tools for Ransomware
|10
|2689
|368