logo

Ransomware: Variants, Working Mechanism, Potential Threats, Mitigation Tools and Recent Attack

   

Added on  2023-06-08

9 Pages2142 Words102 Views
ransomware

Contents
Introduction.................................................................................................................................................2
Introduction about ransomware.............................................................................................................2
Impact of ransomware on the society.....................................................................................................2
Outline of Report.....................................................................................................................................2
Variants of Ransomware.............................................................................................................................2
Draw taxonomy & its discussion..............................................................................................................2
Working Mechanism...................................................................................................................................3
Discuss the working mechanism..............................................................................................................3
Potential Threats.........................................................................................................................................4
System lockup..........................................................................................................................................4
File Encryption and Deletion....................................................................................................................5
Recent Attack..............................................................................................................................................6
Mitigation Tools...........................................................................................................................................7
Discuss any two mitigation tools.............................................................................................................7
Effectiveness of selected mitigation tools...............................................................................................7
Summary.....................................................................................................................................................8
References...................................................................................................................................................8

Introduction
Introduction about ransomware
Ransomware is one of the malicious software that has a problem with the locking of the data in the
system. Here, the ransom is paid for unlocking it. This is one of the new malware which was found in
2013 and there are programs that are generally seen to be infected through it and through the internal
network setup. It has been seen that the attackers are able to encrypt it in the system where there is a
proper holding of the keys of decryption and then holding the data which includes the kidnapping as
well. There are programs which are based on identifying the technical industry development with attack
problems solving. There are victims that mainly comply to hold the demands depending upon how the
cyberhackers are reviewing it, with validation and then handling the safety of the system along with its
confidentiality.
Impact of ransomware on the society
With the changing times, the major concern has been about handling the system infiltration and easy
touch for the system which includes the data changes as well. There are certain perceptions which are
related to how the blackmailing is done for the ransom so that the data is recorded through intervention
of certain company professionals. The loss generally has issues with the cybercrime with locking the
program files as well depending upon the demands that are made with unique decryption keys. They are
created and then stored with the server of hacker. The computer is infected through ransomware with
real loss of the valuable data that affects the system productivity and then there is a need of protecting
the data as well.
Outline of Report
The report will highlight about the changes and the discussions of ransomware with its impacts or the
threats on the system. It will also discuss about the recent incidents that the people have faced.
Variants of Ransomware
Draw taxonomy & its discussion
a. Crypto locker

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of Network Security: Types, Working Mechanism, Threats, Mitigation Tools
|9
|1863
|305

Ransomware: Impact, Variants, Working Mechanism, Threats, and Mitigation Tools
|15
|3067
|180

Potential Threats and Mitigation Tools for Ransomware
|10
|2689
|368

The Age of Ransomware | Understanding Ransomware
|11
|2690
|51

Assignment on IT Security
|11
|2440
|125

Ransomware Attacks and Data Security
|11
|2489
|194