ICT40118 Cyber Security: Demonstration of Ransomware Presentation

Verified

Added on  2022/11/16

|19
|815
|500
Presentation
AI Summary
This presentation delves into the cyber security threat of ransomware, defining it as a malicious act disrupting digital resources. The presentation outlines the aims and objectives, which include comprehending the concept of cyber security, understanding ransomware, and recommending control measures. It explains ransomware as a type of malware that restricts system operation until a ransom is paid, detailing its operation and the assets targeted. The presentation covers controls for mitigating ransomware attacks, such as strong firewalls and up-to-date security software, using WannaCry as a case study to illustrate the impact and management of such threats. The presentation also provides recommendations for future work, including regular security patches and the use of antivirus software.
Document Page
D E M O N S T RAT I O N
O F A CY B E R
S E C U R I T Y T H R E AT
R A N S O M W A R E
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION
A cyber security threat can be
described as a malicious act of
disrupting the digital life and
resources
The term cyber attack
encompasses threats that
includes computer virus, data
breach and denial of service.
The presentation will discuss
the one of the agents of cyber
attack, that is ransomware.
Document Page
AIMS AND
OBJECTIVES
AIM
The presentation aims in
discussing the effect,
impact and control of
ransomware
OBJECTIVE
To comprehend the
concept of cyber
security
To understand the
concept of ransomware
To recommend controls
for management of
these issues
Document Page
MALWARE/
RANSOMWARE
Malware is mainly
described as a malicious
software that is harmful
to an user
The ransomware is
generally designed to
restrict a system and it
operation till its owner
pays the demanded
ransom
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
HOW IT
WORKS/OPERATES?
Malware can be described as
a software that is designed
with an aim of damaging the
computer, server or client
Ransomware is designed for
blocking access to the
computer system.
Ransomware encrypts the
files of the affected
computer and demands a
ransom from the owner
Document Page
ASSETS THAT ARE
TARGETED
Ransomware is a
category of malware
that becomes significant
threat to computer and
software systems
There are two types of
ransomware, which
include crypto
ransomware and locker
ransomware
Document Page
CONTROLS TO THE
TREATS
The ransomware attacks
can be prohibited by
applying proper controls
and information security
Maintaining a strong
firewall is needed for
keeping the security
software up-to-date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
EXAMPLE: WANNA
CRY
Wanna cry is a ransomware
that has infected the NHS
and other organizations
The attack occurred after a
vulnerability in Microsoft’s
software, such as EternalBlue
is detected.
Wanna cry encrypted the
files stored in all the attacked
computers and demanded a
ransom from the owner
Document Page
DISCUSSION OF THE
CASE
The wanna cry ransomware
spread quickly through
several computer networks in
the year 2007
It mainly aimed and stuck
several high profile systems
It consists of multiple
components which include
dropper and a program which
is self contained for extracting
the components of other
applications
Document Page
IMPACT OF
WANNACRY
Within a day of attack, it
had spread across the
globe
It had infected more
than 230,000 computer
systems in an altogether
150 countries
It resulted in a loss of $4
billion
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
HOW THE THREAT
WAS DETECTED?
The threat was detected
by detecting the exploit
through which wanna
cry spread in older
windows systems
The exploit was
EternalBlue that was
leaked by the group
Shadow Brikers
Document Page
HOW THE THREAT
WAS MANAGED?
The infection was
disabled when a security
expert cracked a code
for shutting down the
wanna cry
The entire ransomware
attack was later brought
down with the help of a
white hat hacker
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]