logo

CSI2102 - The Ransomware Virus | Information Security

   

Added on  2020-03-02

9 Pages1696 Words28 Views
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s note

1INFORMATION SECURITY
Executive Summary
The ransomware virus in recent times has become a threat to the individuals and also to the
business organisations. The ransomware virus is responsible for locking up one’s computer
and system and encrypt personal files in lieu of some cash. WannaCry and Petya are of those
two kinds. Petya attacked around June 2017 while WannaCry attacked just a month ago
around May 2017. The Petya and WannaCry ransomware virus have been detailed in this
report. The report highlighted the ransomware virus’ impacts in details and how the virus is
spreading has also been elaborated in the report. If their security gets compromised there is a
possibility to lose confidential information as well as the companies will have to pay a much
higher revenue for the pitfalls. The possible solutions also have been discussed in this report.
The companies must take precautions to ensure and safety of their premises, they must install
antivirus software in their system and must update the software constantly to protect their
office premises hardware and software from the security breaches.

2INFORMATION SECURITY
Table of Contents
Introduction................................................................................................................................3
Part A.........................................................................................................................................3
1. What was the problem?......................................................................................................3
2. How and why it occurred?.................................................................................................3
3. What are the possible solutions?........................................................................................4
Part B..........................................................................................................................................4
1. What was the problem?......................................................................................................4
2. Who were affected and how?.............................................................................................5
3. How was the attack carried out?........................................................................................5
4. What could have been done to prevent the attack?............................................................6
Conclusion..................................................................................................................................6
References..................................................................................................................................8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Report - WannaCry and Petya Ransom Virus
|12
|2947
|59

Information Security in an Organization
|12
|2808
|45

Contemporary Computer Security Issues
|13
|1223
|90

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

Understanding Ransomware Attack and Fence Register in Operating System
|16
|3404
|318