logo

Ransomware Attack: Working Mechanism and Potential Threats

   

Added on  2022-11-17

12 Pages2899 Words166 Views
Running head: IS SECURITIES AND MANAGEMENT
Ransome ware Attack
[Name of the Student:]
[Name of the University:]
[Author Note:]

IS SECURITIES AND MANAGEMENT1
Executive Summary
The below study emphasize on how the ransom wares work and how the viruses effect the
various organizations. The working mechanisms and possible threats imposed by the ransom
wares are discussed along with the examples of different types of ransom wares. The ransom
wares effect the user’s system by blocking access of the files until and unless the ransom is
provided and such malwares are increasing the cybercrimes.

IS SECURITIES AND MANAGEMENT2
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Different types of ransom ware attacks.......................................................................................3
Working mechanism of ransom ware..........................................................................................5
Potential threats by ransom ware.................................................................................................7
Conclusion.......................................................................................................................................8
References......................................................................................................................................10

IS SECURITIES AND MANAGEMENT3
Introduction
In modern society internet plays an important role in the communication, business and
social lives of human beings. However many threats and risks are there while using internet such
as malware and ransom ware attacks which possess direct threat to the user’s and their
confidential data. Ransom ware can be described as a malware that generally comes from the
cryptographic background and it threatens and blocks the user’s access to any kind of website
and data until and unless any monetary ransom is given to the attackers (Aurangzeb et al. 2017).
Many complex algorithms and techniques may be used by the attackers in order to lock the
systems and thus demanding ransom. Such techniques and algorithms which are less complex
can be reversed by the knowledgeable persons sometimes but that is not always possible also.
Strong encryption techniques such as crypto viral extortion is used which encrypts the user’s
data, making them inaccessible to the user’s. The attackers sometimes demand the ransom in
forms of crypto currency such as Bit coin and Ukash as because the tracking back of such
transaction forms are difficult (Bhattacharya and Kumar 2017). The ransom ware attack is
carried by sending some files that look legitimate to a user via email or websites, which when
downloaded activates the ransom ware protocol. However some modern ransom ware viruses
like WannaCry worm does not need the intervention of humans and can travel through
computers effecting a large number of user’s.
Discussion
Different types of ransom ware attacks
Ransom ware attacks are done by the intruders in order to block the access of data to the
users and in order to that some ransoms are demanded. Different types of ransom ware attacks

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber-Security in Shipping Industry: Ransomware and Malware
|9
|1431
|233

Assignment on IT Security
|11
|2440
|125

Ransomware and Its Impact on Society
|8
|2495
|62

Ransomware Attacks: Types, Implementation, Challenges, and Solutions
|10
|661
|46

ISYS100 Information Technology and society
|13
|3604
|69

Malware Research Analysis 2022
|6
|1205
|19