Ransomware Attack Analysis

Verified

Added on  2022/12/27

|6
|1421
|22
Report
AI Summary
This report delves into the growing threat of ransomware attacks, detailing their challenges and proposing innovative solutions such as blockchain technology. It emphasizes the importance of preventive measures and employee awareness in combating these cyber threats. The report also discusses the future of ransomware and the need for continuous adaptation in security strategies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: RANSOMWARE ATTACK
Ransomware Attack
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1RANSOMWARE ATTACK
Challenges of Ransom ware Attack:
In today’s world, with the growth of modern technology in cyber field, the rise in
different types of cyber-attacks is also increasing. One such type of attack is the Ransom ware
attack. Ransom ware attacks are increasing at a rapid speed (Popoola et al. 2017). According to
the report as published by the U.S. government, more than 4,000 attacks in companies are
resulting in payment of about 1 billion of ransom every year. With the increasing amount of
ransom ware variants, various preventive measures have been implemented which gradually led
to several challenges with the attack. One of the challenges of Ransom ware attack is to keep up
the pace along with the ingenuity of the black hat peoples (Conti, Dargahi and Dehghantanha
2018). Challenges in ransom ware attack are growing rapidly while corporations are becoming
more aware of the mode of attack. As security operations are advancing day by day, the mode of
ransom ware attacks are becoming more predictable. The service industry sectors are the most
affected sector as a result of ransom ware. The challenges that are faced in this respect include:
1. Huge cost of replacing the compromised devices: As the ransom ware encrypts all the stored
data in devices using the AES encryption algorithm, hence there is no other way to decrypt the
compromised files without receiving the decryption key which are acquired by the attackers.
2. Losing the proprietary data: This the major challenge that is faced by organizations if they are
under the attack of ransom ware. Longer the ransom ware attack endures more is the loss in
proprietary data as a result of which companies loses the access to their data.
3. Business suffers from system downtime: The real challenge in ransom ware attack that
businesses face is the result in business downtime (Formby, Durbha and Beyah 2017). The
Document Page
2RANSOMWARE ATTACK
downtime in business process results in incurring of various cost resulted from the lost in sales,
productivity and bad publicity.
4. There is no universal recovery tool to roll back the data that are lost.
5. Financial loss: The most damaging challenges of Ransom ware attack is the huge cst that is
incurred as a result of it. It is estimated that about $2.3 million of ransom is incurred from about
1,783 ransom ware complaints.
As ransom ware is becoming the most significant threat among the business organisations, it is
becoming more challenging to prevent the damages caused by the attack.
Our unique solution:
With the latest attacks reported by various agencies the ransom ware attack has known to
have effected to over 200000 computers in over 150 countries. Thus it is essential to take
necessary approach in order to secure the cyberspace within business organization with the latest
security measure in terms of technology (Richardson and North 2017).
Technological solution of ransom ware attack:
Block chain technology: Block chain technology is the modern technology that can be
used in terms of preventing the modern ransom ware attacks (Michael, COHN and BUTCHER
2018). This type of technology is based on distributed technology where all the systems are
included within a Block chain network. This entire block chain network has another copy of the
database and whenever a transaction occurs through it, all computers in the network get notified
in order to verify the transaction. Block chain technology offers no centralized location where
the attackers can attack and steal information. As the entire network gets notified about any
Document Page
3RANSOMWARE ATTACK
malicious activity, hence it becomes impossible for hackers to steal data without raising any
notification.
List of awareness and implementation strategy process: The prevention of ransom ware
attack starts with a series of employee awareness programs and some common ways for avoiding
the attack which are as follows:
1. Backing up systems locally and also in the cloud environment: The first and the foremost
step that needs to be taken in terms of preventing ransom ware attack are by backing up the
system locally as well as via cloud network (Bhattacharya and Kumar 2017). Backing up the
system in cloud environment keeps the data safe where hackers cannot access easily. Failing to
back up the system may lead to damages which are irreparable.
2. Segmenting Network Access: The next step that needs to be taken in terms of preventing any
ransom ware attack is by segmenting the network from attackers. Implementing dynamic control
access within network will help in ensuring the security of the network by segregating it into
different areas which requires credential information in order to access them.
3. Implementing early threat detection systems: Installing early threat detection system is
another preventive measure that helps in identifying the potential attacks that may take place.
Apart from this, early unified threat management programs also helps in creating awareness
about the preventive actions of the ransom ware attack.
4. Installing ransom ware software: Installing security software is the basic measure that needs
to be taken as a means to protect ransom ware attacks (Cabaj and Mazurczyk 2016). The security
software must consist of antivirus, anti-malware benefits and should be regularly updated.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4RANSOMWARE ATTACK
Conclusion and Future work:
Future direction of ransom ware attack:
It is of no surprise that the future of ransom ware attack will be more vulnerable as they
are gradually evolving into malware that disables the entire infrastructure within organization
affecting the business operation until the desired ransom is paid. In future, cybercriminals may
look for attacks in industrial control systems to paralyze the entire network system. The biggest
targeted industry under this attack will be the payment systems. Besides all this, online extortion
is another risk that will make its way while taking up computers and other service hostages
including smartphones and critical infrastructures (Bhardwaj et al. 2016).
Thus in conclusion it can be said, that Ransom ware attack has become the global
incidence with its primary aim in making monetary gains while processing its attack via e-mails
encrypting the targeted files and requesting for payments. A well understanding of the behavior
of ransom ware attack will thus help enterprises to mitigate the vulnerabilities caused as a result
of this attack.
Document Page
5RANSOMWARE ATTACK
References:
Bhardwaj, A., Avasthi, V., Sastry, H. and Subrahmanyam, G.V.B., 2016. Ransomware digital
extortion: a rising new age threat. Indian Journal of Science and Technology, 9(14), pp.1-5.
Bhattacharya, S. and Kumar, C.R.S., 2017, February. Ransomware: The CryptoVirus subverting
cloud security. In 2017 International Conference on Algorithms, Methodology, Models and
Applications in Emerging Technologies (ICAMMAET) (pp. 1-6). IEEE.
Cabaj, K. and Mazurczyk, W., 2016. Using software-defined networking for ransomware
mitigation: the case of cryptowall. Ieee Network, 30(6), pp.14-20.
Conti, M., Dargahi, T. and Dehghantanha, A., 2018. Cyber threat intelligence: challenges and
opportunities (pp. 1-6). Springer International Publishing.
Formby, D., Durbha, S. and Beyah, R., 2017. Out of control: Ransomware for industrial control
systems. In RSA Conference.
Michael, J., COHN, A. and BUTCHER, J.R., 2018. Blockchain technology. The Journal, 1, p.7.
Popoola, S.I., Ojewande, S.O., Sweetwilliams, F.O., John, S.N. and Atayero, A.A., 2017.
Ransomware: Current Trend, Challenges, and Research Directions.
Richardson, R. and North, M.M., 2017. Ransomware: Evolution, mitigation and
prevention. International Management Review, 13(1), p.10.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]