logo

INFORMATION TECHNOLOGY MANAGEMENT.

   

Added on  2023-04-20

4 Pages475 Words380 Views
Running head: INFORMATION TECHNOLOGY MANAGEMENT
Information Technology Management
Name of Student-
Name of University-
Author’s Note-
INFORMATION TECHNOLOGY MANAGEMENT._1
1INFORMATION TECHNOLOGY MANAGEMENT
Crypto-Locker Ransomware Virus
When talked about malware, ransomware is very new and recent virus that is on the
trend. There are many other viruses that are on this way such as Trojan, Spyware, as well as
Viruses. But the most familiar attack of computer virus is the Ransomware virus.
US-CERT (United States Computer Emergency Readiness Team) got alerted of a
malware in the year 2013 which was a type of ransomeware attack. The name of the
ransomeware virus was named as Crypto-Locker that is a new type of ransomware (Richardson
& North, 2017). This malware restricts the user to access the computer that is infected and
demands payment from the victim in order to return the access of the system to them. The main
method of infection is phishing emails that contained malicious attachments.
How it worked
The Crypto-Locker is a malware that has ability in finding the files in a computer system
and encrypt the files that are located in the shared network or external drives or can be even from
the drives that has same cloud storage (Kharraz et al., 2015). If a single computer on the network
gets infected, all the drives on that particular network might also get infected. Crypto-Locker
attacker then connects the C2 server of the attacker for depositing the asymmetric encryption key
away from the victim’s reach. All the files on the victim’s side are encrypted using the
asymmetric encryption.
Prevention
As recommended by US-CERT the users should take the below listed preventive
measures for protecting the computer networks.
INFORMATION TECHNOLOGY MANAGEMENT._2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
To Investigate Crypto Locker
|6
|1334
|59

IT Security Risks and Securities of Ransomware
|14
|2848
|75

Malware Research Analysis 2022
|6
|1205
|19

Security threats Assignment PDF
|17
|5254
|133

Overview of Network Security: Types, Working Mechanism, Threats, Mitigation Tools
|9
|1863
|305

Ransomware and Its Impact on Society
|8
|2495
|62