logo

Ransomware Attack in University Report 2022

   

Added on  2022-09-25

8 Pages1910 Words20 Views
Running head: RANSOMWARE ATTACK IN UNIVERSITY
RANSOMWARE ATTACK IN UNIVERSITY
Name of the Student
Name of the University
Author note

RANSOMWARE ATTACK IN UNIVERSITY
Table of Contents
Introduction: 2
Discussion: 2
What is ransomware? Give a short introduction/overview so that management can
understand. 2
What are the possible ways in which an organisation can be infected? 3
What is the role of cryptography in ransomware? 4
If the university decides not to pay the ransom, what are the options? 5
If the university is considering paying the ransom, what are the advantages and
disadvantages? How is payment normally made (and why)?5
Recommend methods the university should take in the future to avoid becoming
infected: 6
References: 7

RANSOMWARE ATTACK IN UNIVERSITY
Introduction:
Cyber security is perhaps the world's most urgent issue today. The exponential
increase in cyber attack frequency and cyber-threat development has compelled cyber-world
protectors to remain alert forever. It is a competition between the guard and the attacker and
it looks like the attacker can always keep a step ahead (Kharraz et al., 2015). This is
emphasized in the study, which presents the event of a latest ransomware attack in a
university that is causing disturbances throughout the scheme.
The aim of the report is to address the management of the university which has
recently been attacked by a group of ransomware that directly has created a negative impact
on the grading system of the university. The eport discusses on the facts of ransomware and
cryptography ransomware on considered situations along with recommendations on the
following attack.
Discussion:
What is ransomware? Give a short introduction/overview so that management
can understand.
Ransomware is a malware format which encrypts the documents of a victim. The
assailant or the attackers then asks the victim to ansom the person for payment to restore
information and withdraw the system hack that has been done by the attackers.
The instructions for paying an amount to get the decryption key are given to users.
The expenses in Bitcoin can vary from several hundred to thousands of dollars, paid for
cybercriminals.
There are a number of ransomware vectors for computer access. Phishing Spam —
attachments to the victims by e-mail that they masquerade as a file they should trust, is one of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware Research Analysis 2022
|6
|1205
|19

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Extortion Hack: Types, Effects and Prevention Methods
|9
|1842
|92

ITC595 - Information Security | Cyber attack
|13
|2565
|126

Ransomware Attacks in SMEs in Manufacturing Sector: Causes and Framework for Security
|33
|12553
|108

Demonstration of a Cyber Security Threat: Ransomware
|19
|815
|500