logo

ITC595 - Information Security | Cyber attack

   

Added on  2020-03-04

13 Pages2565 Words126 Views
Running head: SYSTEM SECURITY BREACHES SYSTEM SECURITY BREACHESName of the studentName of the universityAuthor note
ITC595 - Information Security | Cyber attack_1
1SYSTEM SECURITY BREACHESExecutive summary: This report aims to analyze the effects and causes of a cyber attacks occurred in 2017. The reportin Part A elaborates the June 2017 and Part B consist of a May 2017 Cyber-attack. An electronicsurvey relative to this case was conducted. The results indicate the various impact, proceduresand solutions for the cyber attacks. This report concludes that the attacks were rather severe. It isrecommended to follow the suggested protective measures against the attacks.
ITC595 - Information Security | Cyber attack_2
2SYSTEM SECURITY BREACHESTable of ContentsPART A:..........................................................................................................................................3INTRODUCTION:......................................................................................................................3DISCUSSION:.............................................................................................................................3CONCLUSION:..........................................................................................................................6PART B:..........................................................................................................................................8INTRODUCTION:......................................................................................................................8DISCUSSION:.............................................................................................................................8CONCLUSION:........................................................................................................................11References:....................................................................................................................................12
ITC595 - Information Security | Cyber attack_3
3SYSTEM SECURITY BREACHESPART A:INTRODUCTION:Cyber-attack is an unethical act by the hackers assigned by states, individuals or groupsthat targets to destroy or damage the metadata secured in a computer system or in aninfrastructure by means of malicious software, ransomware- a specific type, which claims moneyto unblock access to a system. Petya is one such ransomware, encrypting data on Microsoft-Windows systems.1 This report elaborates the global cyber-attack, in reference to the newssearched on the web, from the newspaper site ‘THE GUARDIAN’,2 caused and providespossible solutions to the same. DISCUSSION:Petya, the ransomware encrypts the system data, blocks the access to the boot record, anddemands a ransom in means of bit-coin, a digital key that reboots access to the system. Either thevictims pay the ransom or afford loosing the valuable information.3 Initially, this malware wasdiscovered in March 2016. Numerous forms of the malware were seen propagating to systemsbased on Microsoft-Windows through infected E-mail attachments. Specific differences werenoted in this malware compared to the others, a later form of it being launched with a secondary1Aurangzeb, Sana, et al. "Ransomware: A Survey and Trends."Journal of Information Assurance & Security6.2(2017).2Olivia Solon and Alex Hern, 'Petya' Ransomware Attack: What Is It And How Can It Be Stopped?' (the Guardian,2017) <https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how> accessed 24 August 2017.3Hammill, Ashley.The rise and wrath of ransomware and what it means for society. Diss. Utica College, 2017.
ITC595 - Information Security | Cyber attack_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security in an Organization
|12
|2808
|45

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

Search the Web for News on Computer Security Breaches
|7
|2118
|43

Biggest ransomware outbreak in history hits nearly 100 countries with data held for ransom
|4
|1390
|366

Ransomware Attacks: Bad Rabbit and TeslaCrypt
|12
|2923
|2

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469