logo

CJ 4472 - The Rampage of the Ransomware | WannaCry

   

Added on  2020-03-01

7 Pages921 Words10 Views
Running head: WANNACRY DISASTERWannaCry DisasterName of the Student:Name of the University:Author Note:

1WANNACRY DISASTERExecutive SummaryThe rampage of the ransomware WannaCry that took a toll of 230,000 computers and affectedmany organisations worldwide is the point of attention of the report. The report seeks to projectthe present condition of the cyber world and its effect on the people and organisations. Tosupport this problem, the ransomware issue is discussed in detail along with the steps that hasbeen taken to fight the same.

2WANNACRY DISASTERTable of Contents1. Introduction..................................................................................................................................32. A Brief Overview on the Ransomware........................................................................................33. Method of the Attack...................................................................................................................34. The Affected................................................................................................................................45. Steps Taken to Fight the Crisis....................................................................................................46. Conclusion...................................................................................................................................57. References....................................................................................................................................6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security - (Assignment)
|15
|2875
|18

Assignment On Risk Mitigation and Security Plan
|14
|2958
|38

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

(PDF) Overview of Cyber Security
|8
|1545
|60

Ransomware Malware: A Walkthrough and Real World Example
|5
|1180
|59