logo

Understanding Ransomware Attack and Fence Register in Operating System

   

Added on  2023-04-22

16 Pages3404 Words318 Views
Running head: It SECURITY
It SECURITY
Name of the Student
Name of the University
Author Note:

1It SECURITY
Table of Contents
Part A...................................................................................................................................2
Q.1...................................................................................................................................2
Introduction..................................................................................................................2
Discussion....................................................................................................................2
Conclusion...................................................................................................................5
References....................................................................................................................6
Q.2...................................................................................................................................7
Part B...................................................................................................................................8
Introduction..........................................................................................................................8
Discussion............................................................................................................................8
Problem Encountered.......................................................................................................8
Affect and How................................................................................................................9
Method of attack............................................................................................................10
Preventive Measures......................................................................................................11
Conclusion.........................................................................................................................11
References..........................................................................................................................12

2It SECURITY
Part A
Q.1
Introduction
Digitization in the domain of technology is all about improving the life of various system
user. Digitization has ultimately decreased the number of crimes along documentation of large
number of works [5]. It mainly aims to create a huge number of issues related to personal and
vital information of individuals. There is large number of thefts and cyber-attacks like malware,
spam, Trojan and many more. The main goal of ransomware virus in a system then it can easily
infect and encrypt files of different standards [3]. Ransomware is nothing but a demand which is
paid by the user for getting access to the important files. WannaCry Ransomware Attack 2017 is
nothing but the worst kind of attack.
The upcoming pages of the report mainly tends to highlight encountered problem,
method of occurrence and last possible solution. WannaCry Ransomware is a kind of malicious
attack which can block access of a user to its files or even system. It is all about hosting large
number of files for entire devices before making use of encryption until and unless a ransom is
paid to the hacker.
Discussion
Problem Encountered
WannaCry Ransomware attack 2017 is considered to be as one of the largest kind of
attack. As per [2], India was on the list from this particular cyber attack, Madhya Pradesh was
one of the worst affect regions in the world to date. Organization FedEx, Nissan and railway of

3It SECURITY
Germany and interior industry. It focuses on analyzing some of the telecommunication
organization like mega for telephonic which is based in Spain. Around 16 NHS based
organization which are based in UK are badly affected [4]. Some of UK based system are badly
affect by malware and large number of Chinese student were badly hit by this ransomware.
Fig 1: Ransomware Attack
Source: [6]
How and Why did it occur
The above diagram highlights the Working mechanism of WannaCry Ransomware
Attack. WannaCry is all about locking all the current data in the computer system of different
users [1]. It mainly leaves two files for instructing users that is what user is taken next step for
decrypting the program. The hacker of this WannaCry attack demands the total payment in the
form of bitcoin. There are many instances where the file can be easily deleted. Ransomware
virus can overwrite the content of any file by opening any file, irrespective of the content. The

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware Malware: A Walkthrough and Real World Example
|5
|1180
|59

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

Ransomware and Its Impact on Society
|8
|2495
|62

Cyber Crime: WannaCry Attack on NHS
|10
|2252
|2

Assignment on Ransomware and Cyber Security
|3
|419
|62

Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20