logo

Ransomware Attacks Assignment

18 Pages4239 Words77 Views
   

Added on  2020-04-29

Ransomware Attacks Assignment

   Added on 2020-04-29

ShareRelated Documents
Running head: RANSOMWARE: TO BE PAY OR NOTRansomware: To be pay or notName of the StudentName of the UniversityAuthor Note
Ransomware Attacks Assignment_1
RANSOMWARE: TO BE PAY OR NOTTable of ContentsAbstract............................................................................................................................................31) Introduction.................................................................................................................................32) Literature review.........................................................................................................................42.1) What is Ransomware............................................................................................................42.2) How it works........................................................................................................................52.3) What happens.......................................................................................................................52.4) Increasing Problems.............................................................................................................63) The Scam...................................................................................................................................103.1) The profit............................................................................................................................114) Impact of Paying Ransomware..................................................................................................115) Impact of not Paying Ransomware...........................................................................................126) Mitigation Strategies.................................................................................................................137) Conclusion.................................................................................................................................148) References.................................................................................................................................15
Ransomware Attacks Assignment_2
RANSOMWARE: TO BE PAY OR NOTAbstractIn this new world of technology, everything is being automated and data and information are being savedover the internet for easy accessibility and availability. Ransomware has become one of the most concerning topicsfor this digital world as the world is changing and digitization has become a pillar for the enhancement of life livingfor human beings. Ransomware is an illegal activity made by certain highly trained programmers or by the supportof such programmers. Such unwanted incident opposes the user from getting access to the personal files andinformation of the user and money is demanded in exchange of the cryptographic keys that is a necessary coding foragain gaining access to those files. The purpose of this report is to present a thorough research on the ransomwareattacks and present all the objectives related to the ransom and ransomware malicious coding. This report presentsa literature review on the aspects related to the ransomware attacks that will be helpful in understanding what is it,what how it works, and what happens in the ransomware attack. This report also presents the technical aspectsrelated to the ransomware attack, which highlights on how this attack keep on through malicious coding. Thisreport also highlights on the WannaCry ransomware attack that was represented as the most dangerous and massdestructive ransomware attack and explains how the attack was made and how much destruction could be suchattacks. This report also highlights on the objectives related to the consequences of paying and not paying theransomware attack. 1) IntroductionRansomware is a malware, which prevents the system or limits the user to access get access totheir systems. This can be done by locking the screen of the system or can also be done bylocking the files of the user unless a ransom is paid (Mohurle and Patil, 2017). The data that arepresent in the system of the user is locked by the malware ransomware that is mainly done byencryption and an amount of money is demanded by the attacker and only after the payment, thefiles are decrypted (Smith, 2016). There have arrived modern families of Ransomware. They aremainly categorized as crypto-ransomware that only encrypts certain types of files only on the
Ransomware Attacks Assignment_3
RANSOMWARE: TO BE PAY OR NOTencrypted systems. They enforce the user to pay a certain amount of money through onlinepayment so that they can get the key for decryption.The aim of this report is to present a thorough research on the working and consequences of theransomware attack and put the focus on the mitigation that could be applied in a manner toprevent such attacks. The literature review presents a thorough explanation on the related topicand presents the thought presented by several researchers in different articles. This report alsopresents how an individual and organization could prevent such attacks and be safe from gettinglooted by an intruder.2) Literature review2.1) What is RansomwareIt can be categorized into the cyberattacks in which the victim becomes the prey of a high profileprogrammer and pushed away from accessing own personal information and data saved in thedatabase. After this, the programmer used to claim money in exchange for providing the accessto the same data or information. Ransomware predominantly encrypts the files through usingAES algorithm by using some good methods in a manner to encrypt those files with uniquecoding. Earlier it was reported that the average payment made for the ransom was $500 perincident but it is being expected for now that the price is being doubled or tripled as theorganizations are continuously paying the demand (Ali, 2017). When the system is hacked by theintruder the user gets a pop-up on the screen with written information that the system is hackedor the files are encrypted and the user can only get the access to the data if he or she is ready topay the ransom. Most common ransomware includes crypto-ransomware and Crypto-Locker;those have been evolved during 2013 and are capable of encrypting the files once entered the
Ransomware Attacks Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

Assignment on IT Security
|11
|2440
|125

Ransomware Attacks and Data Security
|11
|2489
|194

Ransomware: Impact, Variants, Working Mechanism, Threats, and Mitigation Tools
|15
|3067
|180

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Malware Research Analysis 2022
|6
|1205
|19