logo

Malware Research Analysis 2022

6 Pages1205 Words19 Views
   

Added on  2022-09-22

Malware Research Analysis 2022

   Added on 2022-09-22

ShareRelated Documents
Running head: MALWARE RESEARCH ANALYSIS
MALWARE RESEARCH ANALYSIS
Name of the Student
Name of the University
Author Note:
Malware Research Analysis 2022_1
Malware Research1
Question 1- What is Ransomware? Give a short introduction/overview so that
management can understand.
Answer:
Ransomware is a type of malware attack which works by encrypting the files of the
targeted victims. Followed by the process to encrypt the victim’s files it demands ransoms
from its targeted victim. The hacker then send the instructions to pay the money by which the
hacker retains money from the victims.
Followed by the above discussion a detail overview of the above aspect is given below:
In the field of cyber-crimes there are various types of Ransomware attacks present
among which phishing is one of the impactful as well as popular Ransomware attack. The
attacker initially sends a spam email in a form of masquerading to the targeted organization.
After the victim downloads the file the hacker can easily get the access to the victims system.
Followed by this process the hacker then encrypts all the information and demands the
decryption ransom from the victims.
Question 2- What are the possible ways in which an organisation can be infected?
Again, aim this at university management.
Answer:
While discussing about the possibilities of the infections in any organization, 5 possible
ways has been listed below by which the organization can get infected:
Downloading the attachments from any spoofed emails or from unknown links invokes the
possibilities of getting harmed by the attacker.
Followed by this in case of any software downloading from any malicious software can
significantly harm the computer system or the entire organizational network.
Malware Research Analysis 2022_2
Malware Research2
Followed by this harmful viruses attached with social media platform the computer or
systems of the social media user can get effected by the attached virus.
Along with all of the above ways it has been also observed from the investigation that there is
a significant of online malicious advertisement which consists armful virus. Those virus
infects the users system or organizational system network.
Question 3- What is the role of cryptography in Ransomware? This should
be explained for a technical audience, that is, the IT staff in the university.
Refer to types of algorithms used and how they are used.
Cryptography is a process by which it encrypts or encode the files which can be then
decoded by a unique decryption key and the ransomware is a type of virus which steals the
victim’s data and ask for ransom. Hence, while discussing about the role of cryptography in
ransomware it has been noticed that the ransomware hackers hacks the victim’s file by
encrypting all of the information and ask for ransom in order to earn ransom. In the current
scenario the Cryptowall and the Crytolocker are most impactful crypto ransomware attacks
which has significantly affected the data security.
Followed by the above concept it has been noticed that in order to encrypt the data
several algorithms has been implemented which includes the Caesar Cipher Algorithm and in
the modern cryptography AES (Advance Encryption System algorithm) is one of the most
used algorithm. These algorithms work by converting the data which termed as the plaintext
into cipher text and then it send to the receiver who will have the decryption code by which
the cipher text can be decoded.
Malware Research Analysis 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware: Impact, Variants, Working Mechanism, Threats, and Mitigation Tools
|15
|3067
|180

Security Concerns of Ransomware
|13
|2895
|140

Disaster Recovery Plan - Ransomware
|4
|1258
|147

Ransomware and Its Impact on Society
|8
|2495
|62

Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

Ransomware: Variants, Working Mechanism, Potential Threats, Mitigation Tools and Recent Attack
|9
|2142
|102