Cybersecurity Report: Strayer University Cyber Computer Crime

Verified

Added on  2022/09/25

|4
|618
|17
Report
AI Summary
This report examines a ransomware attack on a city's computer systems, likely drawing from a real-world scenario involving the city of Independence, Ohio. The report details the technological tools needed to defend against ransomware, including anti-ransomware software, anti-malware programs, and firewalls. It emphasizes the importance of IT personnel, cryptographers, and cybersecurity specialists in mitigating and preventing such attacks. Furthermore, the report highlights the necessity of training modules to educate individuals on ransomware threats and data backup procedures. Post-attack, the report suggests backing up data, upgrading anti-ransomware tools, utilizing cryptographers, and activating firewalls to prevent future incidents. The references provided support the information and provide further reading on the topic.
Document Page
Running head: CYBER COMPUTER CRIME
CYBER COMPUTER CRIME
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER COMPUTER CRIME
Discussions
1. The technological items that can be used in order to save the computer system of the city
from ransomware are anti ransomware, anti malware and firewalls (Mohurle & Patil,
2017):
Anti ransomware: Anti ransomware is a tool of security that can safeguard against the
emerging and the existing attacks of ransomware. Ransomware is a category of software
that is malicious and that is designed in order to block access to the computer and files
until a large sum of money is paid. The computer systems those are used in the city must
install anti ransomware tool in order to protect against the ransomware.
Anti malware: anti malware is a software that is designed in order to prevent, recognise
and eliminate the malicious software in the computer systems as computing devices. The
computer systems must have anti malware in order to protect them from anti ransomware
Firewall: firewall is a system of network security that administers and controls the traffic
of network those are outgoing and incoming and they based on rules of security. Firewalls
can stop the ransomware from getting into the systems through the network of the
computer.
2. The personnel items those are required to withstand the ransomware attacks include
(Collier, 2017):
IT personnel: An IT personnel has all the knowledge of how to mitigate a ransomware
attack
Cryptographer: They have the expertise to decrypt the files those are encrypted by the
attacker in order to get money from the victim
Cyber security specialist: A cyber security specialist knows all the steps how to mitigate
the ransomware attack and how to prevent a ransomware attack.
Document Page
2CYBER COMPUTER CRIME
3. The training requirements are very important in order to train the people about the
ransomware attack. The training requirements required to withstand the ransomware
attack include (Burton & Ko, 2017):
Training module: A training module must be provided to every people in the city so that
they know how to stop the ransomware attack. They also need to know the mitigation
strategies those are important in order to prevent a ransomware attack
The people must be taught to take backup of every data on the computer so when a
ransomware attack take place the files are not deleted.
An application that contains or a video that will help the people how a ransomware attack
can take place and how they can mitigate the ransomware attack
4. After the damage has been done by the ransomware, certain things need to be done so that
no other attack can take place:
Backup the data: the first step is to back up the important data so that they cannot be
deleted or damaged by the ransomware
Upgrading the anti ransomware that is installed in the computer so that they can detect the
ransomware attack
A cryptographer is required in order to decrypt the files those are encrypted by the
attacker
Activate the firewall appliance so that it prevents the another attack on the systems of the
city
Document Page
3CYBER COMPUTER CRIME
References
Burton, J., & Ko, R. (2017). Opinion: Ransomware attack needs global solution.
Collier, R. (2017). NHS ransomware attack spreads worldwide.
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack
2017. International Journal of Advanced Research in Computer Science, 8(5).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]