logo

Security Concerns of Ransomware

13 Pages2895 Words140 Views
   

Added on  2020-04-07

About This Document

IT Security Concerns of Ransomware Introduction 2 Background 2 Essential Risk Factors of Ransomware 3 Database Damage 3 Enhancement in Development of Fake Websites 4 Issues of Phishing 4 Security Worries of Ransomware 4 Identification of Security Worries of Ransomware 6 Solutions to Control Ransomware 7 Conclusion and Future Trends 9 References 10 Introduction Malware attack is most vulnerable virus attack and once it enters into the system it can damage its important files and information that is stored into database. Therefore, it is possible that while transferring files over internet, ransomware

Security Concerns of Ransomware

   Added on 2020-04-07

ShareRelated Documents
IT SecuritySecurity Concerns of RansomwarePage | 1
Security Concerns of Ransomware_1
IT SecurityTable of ContentsIntroduction......................................................................................................................................2Background......................................................................................................................................2Essential Risk Factors of Ransomware............................................................................................3Database Damage........................................................................................................................3Enhancement in Development of Fake Websites.........................................................................4Issues of Phishing.........................................................................................................................4Security Worries of Ransomware....................................................................................................4Identification of Security Worries of Ransomware.........................................................................6Solutions to Control Ransomware...................................................................................................7Conclusion and Future Trends.........................................................................................................9References......................................................................................................................................10Page | 2
Security Concerns of Ransomware_2
IT SecurityIntroduction Malware attack is most vulnerable virus attack and once it enters into the system it can damage its important files and information that is stored into database. Malware has different types such as Spyware, Trojan, Ransomware etc. Every type of malware is critical to control and so much harmful for computer users. Moreover, data that is damaged by ransomware is hard to recover if there is no backup software has used. Today, in business organizations and also at homes computer systems and databases are connected with networks. Therefore, it is possible that whiletransferring files over internet, ransomware or any other virus can enter into any computer system via emails and media files. Ransomware is considered so harmful because it locks the victim’s computer by encryption and it is very difficult to open locked system without decrypt key. The purpose of making this report is to provide comprehensive detail about this malicious virus, its background and its major risk factors (Usa.kaspersky.com, 2017). BackgroundRansomware is not new among IT users. From its background, it is identified that at the end of 19th century it was known among people as AIDS. From that time to till now, various vulnerable cases of this have encountered by people. The main goal of ransomware is to change the name ofa computer file of a victim by using encryption technique. Due to change in file name, victim cannot use that file without getting decryption code from attacker. Here hackers take advantage of this situation and ask for money from victim to provide decryption code. There are several large business organizations that have already encountered this issue of ransomware. Sony, eBayand other ecommerce companies are in list of victims of ransomware (Recorded Future, 2017). Besides this, in past days, a new and popular service of RaaS came into existence that was commonly known as Ransomware-as-a-Service. This service was powerful enough and cyber-Page | 3
Security Concerns of Ransomware_3
IT Securitycriminals got new way to violate computer systems and database securities. Not only RaaS, but also by using other sources hackers were tried to install ransomware into users’ systems and those sources were redirection of web users to fake, suspicious and harmful websites, sending of emails with harmful attachment to different users that can easily enter into victim’s systems and can cause heavy damage and injection of virus into database by using executable scripts. These susceptible sources are also used in modern era by cyber attackers to hack data. On the behalf of this discussion, there is no doubt to say that from its initial stage to till not ransomware has enhanced in its exposure. Now after getting historical information about ransomware, in next of this report, I will emphasize on risk factors and security concerns of this malevolent virus (Security Intelligence, 2017). Essential Risk Factors of Ransomware From last many years, several risk factors of ransomware have encountered by computer users. These risks are important to consider both at users’ and developers’ end to maintain high level security and privacy of computer systems and networks. In upcoming paragraphs, I would like toemphasize on essential some key risk factors related to ransomware (Rains, 2017). Database Damage This is most crucial risk factor of ransomware and other types of malware that these viruses can damage whole database. By hackers a harmful programming code is injected into system by using an unsuitable method and after entering into system virus spreads itself and puts harmful impact on overall functionality of system such as low performance, less security and reliability and interruption in different applications of system. The deleted data of database by ransomware is very hard to rework. But if user has a backup of database then restore is possible. Otherwise, there is no chance for data recovery (TechRepublic, 2017). Page | 4
Security Concerns of Ransomware_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security Risks and Securities of Ransomware
|14
|2848
|75

Ransomware and Its Impact on Society
|8
|2495
|62

Malware Research Analysis 2022
|6
|1205
|19

Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

Cyber Crime: WannaCry Attack on NHS
|10
|2252
|2

Assignment on IT Security
|11
|2440
|125