Ransomware and Data Security: How Safe is Our Data?
Verified
Added on  2023/06/03
|14
|3313
|491
AI Summary
This article discusses the safety and privacy of our data in the modern world of technology, with a focus on ransomware attacks. It provides measures to prevent ransomware attacks and ensure data security. The article also highlights major ransomware attacks and their impact on data integrity.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SYSTEM Information System Student Name: University Name:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SYSTEM With so much discussion about ransomware in the media in recent times discuss how safe is our data? Ransomware is a modern form of malicious software denoted as malware which takes control over the computer of a user and threatens to harm the system. The malware is invoked into system of the user such that the user is denied access to their data. A ransom is demanded by the attacker from the victimsothattheyareabletogainaccesstotheirdataorpersonal informationstoredintheircomputer(Kruseetal.2017).Theusersare provided instructions on their computer screen so that they can pay the fee for getting the decryption key to access their data. The cost or fee for the decryption key ranges from few hundred to thousand dollars which has to be paid by the victim in Bitcoin. In this modern world of technology, there is abrupt changes in innovation and rise of emerging technologies however the safety and privacy of our data still remains a major concern. The data breach or criminal invasion is an unfortunate consequence of utilizing technology in the modern world. The informationordataplaysasignificantroleinourdailylifeaswellas improving our living standards (Thomas and Galligher 2018). Our personal information is being used by most of the major technologies or applications to provide us with better services and functionalities. The information related to finance, healthcare and other services are being analyzed by experts so that they can develop predictions and models to improve our lifestyle based
2INFORMATION SYSTEM on decisions. Various information are being stored in data banks which is protected using some security application or technology however it may be vulnerable to attacks or data breach due to error by human or attack by intruders. With the recent growth of technology application, there is also rising incidents of hacking and data breaches. One such incident of data breach is of Equifax which resulted into exposure oftenmillionspeoplefinancialinformationwhichcanbemisusedasit includedsocialsecuritynumber,driverlicenseandothervaluable information (Green 2017). The data being held by the financial reporting agencies are significant and it is not the only information that can be stolen and misused. Our personal information is also stored by various applications that can be stolen or misused and even the healthcare sector is not safe from data breaches. The data breaches related to healthcare sector requires immediate response as the attackers may obtain vital information such as Creditcardnumbers,Socialsecurityandbillingdataalongwithother personally identifiable information. The services and technology providers have to have to ensure that the information of the customers are secured through secure firewalls, data encryption and monitoring on a constant basis (Scaifeet al.2016). There are various factors due to which data breaches may occur from which failures related to deployment is one of the major cause behind theft or misuse of personal information. The people should have trust and rely on various enterprises or databases that store personal
3INFORMATION SYSTEM information. The data should be kept secure and confidential with the help of proper encryption techniques or security mechanisms. Now a days, the data breach has taken a new form in which the data or information in user computer is being encrypted through a malware that is ransomware. This malware restricts the user from accessing their data and the attacker demands for some fee or payment for the decryption key. The attackercaneasilyaccessandmisusepersonalinformationbygaining access to a victim’s computer. It is becoming a major concern in the present day due to widespread of data online (Yaqoobet al.2017). There are various waysinwhichtheattackercaninvoketheransomwareinavictim’s computer.Oneofthecommonprocessisphishingspamthatcomeas attachmentstothevictimsthroughemailasafile.Oncethefileis downloaded an opened by the victim, the attacker could easily gain control overcomputerofthevictim.Themalwarecaneasilyinfectthevictim’s computer if it is embedded with built-in social engineering tools which are capable of tricking the users so that they allow administrative privileges (Everett 2016). Other forms of ransomware are also there such as NotPetya that looks for security loopholes and exploits the victim’s computer without the need to trick the user. Therearevariouswaysthevictim’scomputercanbeusedoncethe malware infects the system. However, the most common type of threat is that some or all files in the user computer gets encrypted. The user is not
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION SYSTEM able to access data in their computer and it can be decrypted only with the helpofamathematicalkeypossessedbytheattacker.Amessageis displayed on the user screen that explains to the users that the files in their computerarenolongeraccessibleanditcanbedecryptedonlyafter payment to the attacker in the form of Bitcoin. Insomeinstances,theattackersmayrepresentthemselvesasalaw enforcementagency thatisshuttingdownthevictim’scomputerdueto presenceofpiratedsoftwareorillegalcontent.Thepaymentisbeing demandedbytheattackerasafinewhichensuresthatthereisless likelihood of reporting to the authorities by the victims (Gordon, Fairhall and Landman 2017). A variation also exists in this type of malware which is called leakware or doxware where the publicizing of the sensitive data on the hard drive of victim’s computer is threatened by the attacker. The attacker threatens that the data will be publicized unless a ransom is being paid by the victim. The encryption ransomware is the most common form of malware as finding and extracting such sensitive data from the victim’s computer is a tricky scheme for attackers. Therearevariouswaysinwhichtheattackerschoosetheirtargetfor infectingwithransomware.Insomeinstance,theattackertargets universitiesasthereissmallersecurityteamsbuthugeuserbasethat access the networks for file sharing. The accessing of the network by huge number of users without proper security maintenance makes the system
5INFORMATION SYSTEM vulnerable and the attacker is able to easily penetrate their defense (Cohen, HoffmanandAdashi2017).Further,someorganizationsarealsobeing targeted as they are more likely to pay the ransom quickly. For example, government or healthcare agencies needs immediate access to their data and law firms or other relate agencies also fear compromise of sensitive data. The ransomware is also widely spreading across the internet and it may affect any individual accessing files in the web. There are various ways in which ransomware infection can be prevented to ensure safety and privacy of our data (Continellaet al.2016). Some of the measures that can be taken to ensure prevention of ransomware attack are presented as below: ï‚·The operation system should be kept updated and patched so that there is less chance of vulnerability that can be exploited. ï‚·Unknown software should not be installed or given administrative privileges (Bhattacharya and Kumar 2017). ï‚·Antivirussoftwareshouldbeinstalledfordetectingmaliciousor unwantedprogramssothatunauthorizedapplicationscanbe executed. ï‚·Backupoffilesshouldbetakenfrequentlyandautomaticallyto ensure that valuable information can be retrieved in case of any malware attack.
6INFORMATION SYSTEM Thefactofransomwareattacksisnotunknownanddespiteofmany research and efforts, the law enforcement agencies are still not capable of tracking the source of attacks. The payments are being made in the form of bitcoinssothereisnotrailofsuchattacksthatcanbeidentifiedfrom transactions. The law enforcement agencies strongly oppose the payment of ransomware as it only encourages the attackers and provides funding so that they are able to develop more ransomware (Yao 2018). The organizations being affected by the ransomware does not consider the long term impact and starts with a cost benefit analysis to measure the ransom value against theencrypteddata.Theyfindthattheirdataismuchvaluableandthe ransom is not of significant amount as the value of their data. According to a research by Pope (2016), it has been found that 66% of companies verbally show that they prefer not to pay the ransom but the actual fact is that around 65% companies actually pay ransom when they face such attack. The attackers keep the ransom amount low within a limit of $700 to $1300 that can be easily paid by the companies. Some malware are such sophisticated such that it is able to detect the location of the victim’s computer and adjust the ransom so that it can match with economy of the located country. The attacker demands the ransom as rich countries will be able to pay more than the poor countries. In some situations, discounts are also being offered depending upon the response time so that the victims are encouragedtopaymorequicklythanexpected.Thepricepointofthe ransom is set considering that it is sufficient for the criminal but it is low to
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION SYSTEM the victim as compared to restoring or reconstructing their lost data so that they can easily make the payment. In the recent days, some companies are building the potential in their security plans so that they can easily pay the ransom (Mauryaet al.2018). For example, some large companies in the UK arenotinvolvedwithcryptocurrencybutholdssomereservedbitcoins specially for making payments for ransom. There are also many tricks played by the attackers to get ransom as some malware maybe scareware that does not encrypts all data of the victim and only threatens them with a message ofsuchattack.Thereisalsoamajorconcernthateverytimeitisnot guaranteed to get the data decrypted as the attacker may run away with the money. Some of the ransomware existed since 1990’s and throughout the past years, there has been significant evolution in the malwares (Huanget al.2018). The major and worst malwares that are existing and impacting the data integrity are presented as below: CryptoLocker:This malware is attacked first in the year 2013 that infected almost 500,000 machines. TeslaCrypt:Thismalwaretargetsthegamingfilesandithasbeen constantly improving since the first attack (Butler 2017). SimpleLocker:It is the first ransomware attack that widespread focusing on mobile devices.
8INFORMATION SYSTEM WannaCry:It was being developed by NSA and then the attackers stole it which then expanded autonomouslyfrom computerto computerthrough EternalBlue. NotPetya:It is also called as EternalBlue that is a part of cyberattack being directed by Russia against Ukraine. Locky:It began to spread in 2016 and it was similar to the mode of attack that occurred in Dridex, a banking software. Datasecurityisoneoftheessentialconcerninthismodernageof informationandcommunicationtechnology.Presently,thedataof individuals are being widespread in the internet as those are gathered by manyapplicationsorservicesovertheinternet(Conti,Dargahiand Dehghantanha2018).Thesecurityofourdataisamajorissuethatis bothering both the individuals as well as organizations as they feat the loss or compromise of their valuable information. It has been found from many researches that security of confidentiality of data is ensured but there are no proper security measures to protect the data. The rise of social media and cloudcomputingissignificantlycontributingtotheexposureofvaluable informationorpersonaldataasthosearestoredincloudsthatcanbe accessed by an attacker to get hold of huge customer information. There are various ways in which data security can be ensured from the perspective of end user as mentioned below:
9INFORMATION SYSTEM ï‚·Updating and patching the operation system on a regular basis so that there is less chance of vulnerability that can be exploited. ï‚·Theusersshouldnotinstallorgiveadministrativeprivilegesto software or applications that are unknown to them (Keogh, Gordon and Marinovic 2018). ï‚·Properantivirussoftwareorprogramshouldbeinstalledsothat malicious or unwanted programs can be detected to stop execution of unauthorized applications. ï‚·Backup should be taken for valuable or sensitive data frequently and automatically to ensure that valuable information can be retrieved in case of any malware attack. ï‚·Theusersmustmakeuseofstrongpasswordencryption mechanisms so that their credentials could not be easily accessed by the attacker. One of the most common measure to ensure data security is robust backup such that only the valuable or sensitive information could be recovered in case of emergency or external attack (Stephen 2017). The protection of data from unauthorized access is one of the major consideration that should be taken care of for securing the data from externa attacks or ransomware. The most effective way to mitigate the threats being faced in this modern world due to the advancements in technology as well as malwares affecting data
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10INFORMATION SYSTEM security is adoption of suitable cybersecurity methods. The data breach or encryption does not only causes financial impact but it also results into loss ofservicesthatarebeingofferedtothecustomers.Fromtheoverall analysis, it can said that our data is not safe although the cloud service providers or other organizations guarantee data security and confidentiality (Martinetal.2017).Theattacksoccurringusingransomwareorother malwaresarenoteasytopreventhoweverthereisaneedtotake precautionary measures by individuals as well as organizations to ensure the safety and security of valuable data.
11INFORMATION SYSTEM References Bhattacharya,S.andKumar,C.R.S.,2017,February.Ransomware:The CryptoVirus subverting cloud security. InAlgorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), 2017 International Conference on(pp. 1-6). IEEE. Butler,J.,2017.FindinganUnlikelyCombatantintheWaragainst Ransomware:OpportunitesforProviderstoUtilizeoff-SiteDataBackup within the HIPAA Omnibus and HITECH Amendments.. Louis UJ Health L. & Pol'y,11, p.317. Cohen, I.G., Hoffman, S. and Adashi, E.Y., 2017. Your Money or Your Patient's Life?RansomwareandElectronicHealthRecords.Annalsofinternal medicine,167(8), pp.587-588. Conti, M., Dargahi, T. and Dehghantanha, A., 2018. Cyber Threat Intelligence: Challenges and Opportunities.Cyber Threat Intelligence, pp.1-6. Continella,A.,Guagnelli,A.,Zingaro,G.,DePasquale,G.,Barenghi,A., Zanero,S.andMaggi,F.,2016,December.ShieldFS:aself-healing, ransomware-awarefilesystem.InProceedingsofthe32ndAnnual Conference on Computer Security Applications(pp. 336-347). ACM. Everett, C., 2016. Ransomware: to pay or not to pay?.Computer Fraud & Security,2016(4), pp.8-12.
12INFORMATION SYSTEM Gordon,W.J.,Fairhall,A.andLandman,A.,2017.ThreatstoInformation Security—PublicHealthImplications.NewEnglandJournalof Medicine,377(8), pp.707-709. Green,A.,2017.RansomwareandtheGDPR.NetworkSecurity,2017(3), pp.18-19. Huang,D.Y.,Aliapoulios,M.M.,Li,V.G.,Invernizzi,L.,Bursztein,E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A.C. and McCoy, D., 2018, May. Tracking ransomware end-to-end. In2018 IEEE Symposium on Security and Privacy (SP)(pp. 618-631). IEEE. Keogh,K.,Gordon,C.andMarinovic,P.,2018.Cybersecurity:Global developmentsincyber securitylaw:isAustraliakeepingpace?.LSJ:Law Society of NSW Journal, (42), p.82. Kruse,C.S.,Frederick,B.,Jacobson,T.andMonticone,D.K.,2017. Cybersecurityinhealthcare:Asystematicreviewofmodernthreatsand trends.Technology and Health Care,25(1), pp.1-10. Martin,G.,Martin,P.,Hankin,C.,Darzi,A.andKinross,J.,2017. Cybersecurity and healthcare: how safe are we?.Bmj,358, p.j3179. Maurya, A.K., Kumar, N., Agrawal, A. and Khan, R.A., 2018. Ransomware: Evolution, Target and Safety Measures. Pope,J.,2016.Ransomware:minimizingtherisks.Innovationsinclinical neuroscience,13(11-12), p.37.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13INFORMATION SYSTEM Scaife, N., Carter, H., Traynor, P. and Butler, K.R., 2016, June. Cryptolock (anddropit):stoppingransomwareattacksonuserdata.InDistributed ComputingSystems(ICDCS),2016IEEE36thInternationalConference on(pp. 303-312). IEEE. Stephen,J.,2017.Bewaretheransomware:Protectingyourdatamore important than ever.Wisconsin Law Journal. Thomas, J. and Galligher, G., 2018. Improving backup system evaluations in information security risk assessments to combat ransomware. ur Rehman, H., Yafi, E., Nazir, M. and Mustafa, K., 2018, October. Security Assurance Against Cybercrime Ransomware. InInternational Conference on Intelligent Computing & Optimization(pp. 21-34). Springer, Cham. Yao,D.D.,2018,June.DataBreachandMultiplePointstoStopIt. InProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies(pp. 1-1). ACM. Yaqoob,I.,Ahmed,E.,urRehman,M.H.,Ahmed,A.I.A.,Al-garadi,M.A., Imran,M.andGuizani,M.,2017.Theriseofransomwareandemerging securitychallengesintheInternetofThings.ComputerNetworks,129, pp.444-458.