A Detailed Report on Global Security Breaches and Attacks
VerifiedAdded on  2020/02/24
|13
|2940
|48
Report
AI Summary
This report provides an in-depth analysis of two major security breaches: the Shadow Brokers' exposure of NSA information and the WannaCry ransomware attack. The first part of the report details the Shadow Brokers' activities, including their exploitation of NSA-related hacking tools, the reasons behind their actions, and potential solutions to mitigate such attacks. The second part focuses on the WannaCry ransomware, describing its global impact, the methods used to carry out the attack, and strategies for prevention. The report examines the technical aspects of both incidents, including the vulnerabilities exploited, the impact on various organizations and individuals, and the responses from security agencies and software developers. It highlights the importance of strong security protocols and proactive measures to prevent future cyberattacks. This report is contributed by a student and is available on Desklib, a platform offering AI-powered study tools for students.

Running head: SECURITY BREACHES
Security Breaches
Name of the student
Name of the University
Author Note
Security Breaches
Name of the student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1SECURITY BREACHES
Executive summary
The following report discusses about the major security breaches that affected the whole world.
The first part of the report discusses about the Shadow broker organization that breached
information about the NSA. The second part of the report includes the operation and threats of
the WannaCry ransomware attack.
Executive summary
The following report discusses about the major security breaches that affected the whole world.
The first part of the report discusses about the Shadow broker organization that breached
information about the NSA. The second part of the report includes the operation and threats of
the WannaCry ransomware attack.

2SECURITY BREACHES
Table of Contents
Part A (The breach by Shadow brokers):........................................................................................3
Introduction:................................................................................................................................3
Discussion:...................................................................................................................................3
Identification of the problem:..................................................................................................3
Reason of occurrence:..............................................................................................................4
Solutions:.................................................................................................................................5
Conclusion:..................................................................................................................................6
Part 2 (Ransomware attack):............................................................................................................6
Introduction:................................................................................................................................6
Discussion:...................................................................................................................................7
Description of the problem:.....................................................................................................7
Impact of the problem:.............................................................................................................8
Carrying out of the attack:.......................................................................................................8
Prevention:...............................................................................................................................9
Conclusion:..................................................................................................................................9
References:....................................................................................................................................11
Table of Contents
Part A (The breach by Shadow brokers):........................................................................................3
Introduction:................................................................................................................................3
Discussion:...................................................................................................................................3
Identification of the problem:..................................................................................................3
Reason of occurrence:..............................................................................................................4
Solutions:.................................................................................................................................5
Conclusion:..................................................................................................................................6
Part 2 (Ransomware attack):............................................................................................................6
Introduction:................................................................................................................................6
Discussion:...................................................................................................................................7
Description of the problem:.....................................................................................................7
Impact of the problem:.............................................................................................................8
Carrying out of the attack:.......................................................................................................8
Prevention:...............................................................................................................................9
Conclusion:..................................................................................................................................9
References:....................................................................................................................................11

3SECURITY BREACHES
Part A (The breach by Shadow brokers):
Introduction:
A group of mysterious hackers is seen to be involved with the dealing of malware and
hacking tools that is an associated tool used by the National Security Agency (NSA) of America.
This topic of secrecy and controversy regarding the tools that are involved with the National
Security Agency (NSA), are exposed by the mysterious group involved in crime known as the
Shadow Brokers.
This report discusses about the nature of the problems that was caused by this group, the
reason for its occurrence and the mitigation of such attacks in the future.
Discussion:
The Shadow Brokers are a group of hackers whose existence came in light in 2016,
summer. These groups of hackers were involved in exploiting the resources obtained from
information leaks associated with the National Security Agency (NSA). The exploited resources
were used to target the firewalls of business enterprises, anti-viruses and products related to the
Microsoft Corporation (Martin, Kinross & Hankin, 2017). The Shadow Brokers are mainly
informed with the main hack, which is termed as the Equation Group that is associated with
operations of National Security Agency (NSA).
Identification of the problem:
In August of 2016, the group of hackers claimed to have stolen a cyber weapon from
another hacking team, which was termed as the Equation Group. The cyber weapon was used by
the National Security Agency (NSA). The cyber weapon involved provided the group access to
the secretive files contained in the NSA. The group also led to hacking and exploiting secret
Part A (The breach by Shadow brokers):
Introduction:
A group of mysterious hackers is seen to be involved with the dealing of malware and
hacking tools that is an associated tool used by the National Security Agency (NSA) of America.
This topic of secrecy and controversy regarding the tools that are involved with the National
Security Agency (NSA), are exposed by the mysterious group involved in crime known as the
Shadow Brokers.
This report discusses about the nature of the problems that was caused by this group, the
reason for its occurrence and the mitigation of such attacks in the future.
Discussion:
The Shadow Brokers are a group of hackers whose existence came in light in 2016,
summer. These groups of hackers were involved in exploiting the resources obtained from
information leaks associated with the National Security Agency (NSA). The exploited resources
were used to target the firewalls of business enterprises, anti-viruses and products related to the
Microsoft Corporation (Martin, Kinross & Hankin, 2017). The Shadow Brokers are mainly
informed with the main hack, which is termed as the Equation Group that is associated with
operations of National Security Agency (NSA).
Identification of the problem:
In August of 2016, the group of hackers claimed to have stolen a cyber weapon from
another hacking team, which was termed as the Equation Group. The cyber weapon was used by
the National Security Agency (NSA). The cyber weapon involved provided the group access to
the secretive files contained in the NSA. The group also led to hacking and exploiting secret
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4SECURITY BREACHES
information from software accounting to 1 gigabyte of information over a period of 8 months.
This information was connected to the NSA (Sanger, 2016). The group also tried to sell the
source code of particular information from NSA by using the online methods of auction. The
auction was supposed to be transacted via the use of crypto currencies. However, the auction was
an unsuccessful one.
On April 2017 the most recent activity of the group of hackers, include a data dump. The
dump of data accounted to 300 megabytes of data. The data associated made published reports of
threats and vulnerabilities of the products of Microsoft. The Shadow brokers also claimed to
publish hacked tools and resources from the CIA that was originally made to spy on the
monetary transactions of people (Shane, Mazzetti & Rosenberg, 2017). This led the group claim
associated vulnerabilities in the Windows version of the Microsoft installed in the Swift bank.
As, the software is used by multiple banks, the exploitation posed a grave threat to the banks all
over the world.
Reason of occurrence:
The main reason for occurrence of these hacks is the presence of bugs and malware in a
system. The government agencies are responsible to conduct spying and espionage operations on
particular targets by getting close to their system. The method used by them is acquisition of
vulnerabilities in its system due to presence of bugs in the system. Rather than informing the
manufacturers about the presence of such malfunctions, they exploit them to get access to the
system to conduct their operations (van Der Walt, 2017). This system led to the hacking of such
amount from the government agencies. This led to the raising of questions about the security of
the agencies involved. This issue was further debated by the presence of FBI to give light on the
discussion about the requirements of law enforcement in agencies.
information from software accounting to 1 gigabyte of information over a period of 8 months.
This information was connected to the NSA (Sanger, 2016). The group also tried to sell the
source code of particular information from NSA by using the online methods of auction. The
auction was supposed to be transacted via the use of crypto currencies. However, the auction was
an unsuccessful one.
On April 2017 the most recent activity of the group of hackers, include a data dump. The
dump of data accounted to 300 megabytes of data. The data associated made published reports of
threats and vulnerabilities of the products of Microsoft. The Shadow brokers also claimed to
publish hacked tools and resources from the CIA that was originally made to spy on the
monetary transactions of people (Shane, Mazzetti & Rosenberg, 2017). This led the group claim
associated vulnerabilities in the Windows version of the Microsoft installed in the Swift bank.
As, the software is used by multiple banks, the exploitation posed a grave threat to the banks all
over the world.
Reason of occurrence:
The main reason for occurrence of these hacks is the presence of bugs and malware in a
system. The government agencies are responsible to conduct spying and espionage operations on
particular targets by getting close to their system. The method used by them is acquisition of
vulnerabilities in its system due to presence of bugs in the system. Rather than informing the
manufacturers about the presence of such malfunctions, they exploit them to get access to the
system to conduct their operations (van Der Walt, 2017). This system led to the hacking of such
amount from the government agencies. This led to the raising of questions about the security of
the agencies involved. This issue was further debated by the presence of FBI to give light on the
discussion about the requirements of law enforcement in agencies.

5SECURITY BREACHES
The codes that were made public by the Shadow brokers were made to be readable even
by the low programmable experts to facilitate its uses in all devices. Even its use would not
require great programming experts to run and implement them (Audiot, 2016). The code was
supposed to be a bit old but they included many powerful tools to facilitate the process of
hacking. The first documents that were released included system vulnerabilities in Cisco and
other developers.
The documents that were released recently by the Shadow Brokers showed the spying
operations of NSA on a Middle Eastern bank transfer network termed as SWIFT. The hack
revealed the operation of the NSA who was trying to get access to targeted clients of the bank
transfer network (Boylan, 2015). This led to hindrance in the operation of the NSA as rising of
suspicions of the bank were prominent.
As far the authenticity of the stolen documents goes, Edward Snowden of NSA reported
the genuineness of the stolen resources as the malware was full of virtual prints of the NSA. The
malware also included a 16-digit identification code for the NSA (Broadhurst et al., 2017).
According to Kaspersky, similarities in documents may lead to authenticity of the found sources.
In addition, the Risk Based Security confirmed the exploitation of resources from NSA but no
breaches were made in the system of the NSA.
Solutions:
There are various speculations regarding the problem that occurred due to the Shadow
brokers. Moreover, the organization involved is already applying solution-based protocols to
minimize the further risks that can arise.
However, it was seen that Microsoft started working on their patch to address the
vulnerability many weeks before the posting of the message from Shadow Brokers. The reason
The codes that were made public by the Shadow brokers were made to be readable even
by the low programmable experts to facilitate its uses in all devices. Even its use would not
require great programming experts to run and implement them (Audiot, 2016). The code was
supposed to be a bit old but they included many powerful tools to facilitate the process of
hacking. The first documents that were released included system vulnerabilities in Cisco and
other developers.
The documents that were released recently by the Shadow Brokers showed the spying
operations of NSA on a Middle Eastern bank transfer network termed as SWIFT. The hack
revealed the operation of the NSA who was trying to get access to targeted clients of the bank
transfer network (Boylan, 2015). This led to hindrance in the operation of the NSA as rising of
suspicions of the bank were prominent.
As far the authenticity of the stolen documents goes, Edward Snowden of NSA reported
the genuineness of the stolen resources as the malware was full of virtual prints of the NSA. The
malware also included a 16-digit identification code for the NSA (Broadhurst et al., 2017).
According to Kaspersky, similarities in documents may lead to authenticity of the found sources.
In addition, the Risk Based Security confirmed the exploitation of resources from NSA but no
breaches were made in the system of the NSA.
Solutions:
There are various speculations regarding the problem that occurred due to the Shadow
brokers. Moreover, the organization involved is already applying solution-based protocols to
minimize the further risks that can arise.
However, it was seen that Microsoft started working on their patch to address the
vulnerability many weeks before the posting of the message from Shadow Brokers. The reason

6SECURITY BREACHES
might be NSA disclosing about the information of exploited resources. Though a system patch
requires weeks before making it public the reason of applied solution can be disclosure of
information from the NSA (Planqué, 2016). The theory discussed is not evident as both parties
are not claiming about the disclosure of information, but it might be the reason for applying
patches to the system to help in mitigating the risks.
The Vulnerabilities Equity process was created under the influence of Obama and now is
continued by Trump (Caulfield, Ioannidis & Pym, 2017). It was made to minimize the security
vulnerabilities and threats to the agencies of the government that could lead to various large-
scale problems.
Conclusion:
Thus, it can be concluded that the presence of strong security protocols cannot be
effective sometimes and the process used to get targeted information from other people can be
used to get the information form themselves.
Part 2 (Ransomware attack):
Introduction:
The ransomware attack, which took place in May 2017, was a massive cyber attack that
affected users from all over the world. The computers who had the Microsoft Operating system
installed were targeted by the ransomware. The main characteristics of the ransomware are that
after infecting a computer, some files were encrypted and required payments in bitcoin to
decrypt them.
This report discusses about the specifications of the ransomware attack that took place all
over the world. The report also includes the process of attack and the prevention of the attack.
might be NSA disclosing about the information of exploited resources. Though a system patch
requires weeks before making it public the reason of applied solution can be disclosure of
information from the NSA (Planqué, 2016). The theory discussed is not evident as both parties
are not claiming about the disclosure of information, but it might be the reason for applying
patches to the system to help in mitigating the risks.
The Vulnerabilities Equity process was created under the influence of Obama and now is
continued by Trump (Caulfield, Ioannidis & Pym, 2017). It was made to minimize the security
vulnerabilities and threats to the agencies of the government that could lead to various large-
scale problems.
Conclusion:
Thus, it can be concluded that the presence of strong security protocols cannot be
effective sometimes and the process used to get targeted information from other people can be
used to get the information form themselves.
Part 2 (Ransomware attack):
Introduction:
The ransomware attack, which took place in May 2017, was a massive cyber attack that
affected users from all over the world. The computers who had the Microsoft Operating system
installed were targeted by the ransomware. The main characteristics of the ransomware are that
after infecting a computer, some files were encrypted and required payments in bitcoin to
decrypt them.
This report discusses about the specifications of the ransomware attack that took place all
over the world. The report also includes the process of attack and the prevention of the attack.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7SECURITY BREACHES
Discussion:
A cyber attack involving the ransomware had been originated due to the theft in cyber
weapons (Brewer, 2016). The researchers of security in the Kaspersky Lab recorded more than
45,000 attacks in users belonging to 99 countries, which included UK, India, Russia, Italy, China
and Egypt. However, the attack involved was not meant to target large-scale businesses but were
meant to attack random users.
Description of the problem:
The WannaCry ransomware attack was an attack in a worldwide level that took place in
May 2017, was a massive cyber attack that affected users from all over the world. The computers
who had the Microsoft Operating system (OS) installed were targeted by the WannaCry
ransomware (Kharraz et al., 2015). The main characteristics of the ransomware are that after
infecting a computer, some files were encrypted and required payments in bitcoin to decrypt
them.
The main users who were risked due to the attack were the users with older versions of
the OS like the Windows XP and the Windows Server 2003. Although, after the attack Microsoft
made security patches to address the vulnerabilities in the system, the patches were made for the
newer versions like the Windows 7 and 8. Due to this, Microsoft made an emergency patch for
the older versions too.
After many days of the ransomware attack, almost all of the infected users applied their
updates in the system, which slowed down the infectious problems (Pathak & Nanded, 2016). In
addition, detailed technical reports were analyzed and made by several companies including
Microsoft, Cisco and McAfee.
Discussion:
A cyber attack involving the ransomware had been originated due to the theft in cyber
weapons (Brewer, 2016). The researchers of security in the Kaspersky Lab recorded more than
45,000 attacks in users belonging to 99 countries, which included UK, India, Russia, Italy, China
and Egypt. However, the attack involved was not meant to target large-scale businesses but were
meant to attack random users.
Description of the problem:
The WannaCry ransomware attack was an attack in a worldwide level that took place in
May 2017, was a massive cyber attack that affected users from all over the world. The computers
who had the Microsoft Operating system (OS) installed were targeted by the WannaCry
ransomware (Kharraz et al., 2015). The main characteristics of the ransomware are that after
infecting a computer, some files were encrypted and required payments in bitcoin to decrypt
them.
The main users who were risked due to the attack were the users with older versions of
the OS like the Windows XP and the Windows Server 2003. Although, after the attack Microsoft
made security patches to address the vulnerabilities in the system, the patches were made for the
newer versions like the Windows 7 and 8. Due to this, Microsoft made an emergency patch for
the older versions too.
After many days of the ransomware attack, almost all of the infected users applied their
updates in the system, which slowed down the infectious problems (Pathak & Nanded, 2016). In
addition, detailed technical reports were analyzed and made by several companies including
Microsoft, Cisco and McAfee.

8SECURITY BREACHES
Impact of the problem:
The researchers of security in the Kaspersky Lab recorded more than 45,000 attacks in
users belonging to 99 countries, which included UK, India, Russia, Italy, China and Egypt. In
addition, the most affected countries among them were the Ukraine, Taiwan, India and Russia.
The WannaCry ransomware attack also caused diverse impact on the National Health
Service hospitals in Scotland and England, which also included 70,000 devices like the
computers, scanners, and other equipments in the health care services (Chinthapalli, 2017).
In addition, the ransomware also had its impact on the motor services including the
Nissan and the Renault. Nissan stopped their production in order to stop the spreading of the
ransomware. Renault also followed the same strategy to stop the spreading of the ransomware by
halting their production across several sites.
The impact of the attack is said to be low due to the fast analysis of the code of the
ransomware, which had vulnerability in its code (Boatman, 2015). The presence of a technical
‘kill switch’ made spreading of the attack stop. The loss in infrastructure could lead up to several
millions.
Carrying out of the attack:
The WannaCry ransomware attack was carried out using several sets of software made
for hacking. The External Blue is one such program. The software exploits a specific
vulnerability that is present in the OS of Windows (Kharraz et al., 2016). This vulnerability can
lead to breach in the system even under strong protocols. For mitigating such risks in the system,
Microsoft released a patch to fight the vulnerability and risk due to the presence of such threat.
Impact of the problem:
The researchers of security in the Kaspersky Lab recorded more than 45,000 attacks in
users belonging to 99 countries, which included UK, India, Russia, Italy, China and Egypt. In
addition, the most affected countries among them were the Ukraine, Taiwan, India and Russia.
The WannaCry ransomware attack also caused diverse impact on the National Health
Service hospitals in Scotland and England, which also included 70,000 devices like the
computers, scanners, and other equipments in the health care services (Chinthapalli, 2017).
In addition, the ransomware also had its impact on the motor services including the
Nissan and the Renault. Nissan stopped their production in order to stop the spreading of the
ransomware. Renault also followed the same strategy to stop the spreading of the ransomware by
halting their production across several sites.
The impact of the attack is said to be low due to the fast analysis of the code of the
ransomware, which had vulnerability in its code (Boatman, 2015). The presence of a technical
‘kill switch’ made spreading of the attack stop. The loss in infrastructure could lead up to several
millions.
Carrying out of the attack:
The WannaCry ransomware attack was carried out using several sets of software made
for hacking. The External Blue is one such program. The software exploits a specific
vulnerability that is present in the OS of Windows (Kharraz et al., 2016). This vulnerability can
lead to breach in the system even under strong protocols. For mitigating such risks in the system,
Microsoft released a patch to fight the vulnerability and risk due to the presence of such threat.

9SECURITY BREACHES
The execution of the ransomware attack is divided into three different processes. These
include the spreading of the vulnerability, encrypting of the file, displaying of ransom
information and decrypting the encrypted file.
The main sample program is the main program responsible for spreading the attack and
releasing the WannaCry ransomware (Tuttle, 2016). This results in encryption of a file. The
sample program includes an RSA public key and its corresponding private key is present with
the attacker. Before applying encryption, a new sub-public and sub-private key is generated. The
sub-public key is used to encrypt the user file and the sub-private key is used to do the same.
Decrypting is usually done after payment is confirmed in the bitcoin network as the ransomware
demands for payment in bitcoin.
Prevention:
Although, many risk mitigation processes where undertaken after the attack has been
taken. Several companies like the Microsoft made security patches to fight the ransomware
attack, which significantly slowed the spreading of the infected ransomware (Choi, Scott &
LeClair, 2016). However, the presence of security protocols where to be taken before hand so
that the problem in infection could have been minimized and the large-scale problem could have
been minimized.
Various procedures could slow the process of ransomware attack in a device. Network
segmentation is one such process where the infrastructure is divided among the connected and
the unconnected one, which will facilitate the segmentation of the infrastructure to avoid the
vulnerable areas to be hit directly (Mansfield-Devine, 2016). In addition, the Enhanced
Mitigation Experience Toolkit of the Microsoft helps to provide additional security to the system
that is specifically made to fight the ransomware attacks. The presence of other upgraded
The execution of the ransomware attack is divided into three different processes. These
include the spreading of the vulnerability, encrypting of the file, displaying of ransom
information and decrypting the encrypted file.
The main sample program is the main program responsible for spreading the attack and
releasing the WannaCry ransomware (Tuttle, 2016). This results in encryption of a file. The
sample program includes an RSA public key and its corresponding private key is present with
the attacker. Before applying encryption, a new sub-public and sub-private key is generated. The
sub-public key is used to encrypt the user file and the sub-private key is used to do the same.
Decrypting is usually done after payment is confirmed in the bitcoin network as the ransomware
demands for payment in bitcoin.
Prevention:
Although, many risk mitigation processes where undertaken after the attack has been
taken. Several companies like the Microsoft made security patches to fight the ransomware
attack, which significantly slowed the spreading of the infected ransomware (Choi, Scott &
LeClair, 2016). However, the presence of security protocols where to be taken before hand so
that the problem in infection could have been minimized and the large-scale problem could have
been minimized.
Various procedures could slow the process of ransomware attack in a device. Network
segmentation is one such process where the infrastructure is divided among the connected and
the unconnected one, which will facilitate the segmentation of the infrastructure to avoid the
vulnerable areas to be hit directly (Mansfield-Devine, 2016). In addition, the Enhanced
Mitigation Experience Toolkit of the Microsoft helps to provide additional security to the system
that is specifically made to fight the ransomware attacks. The presence of other upgraded
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10SECURITY BREACHES
securities in the connected device is another mitigation process, which involves detection of
malicious attacks to the system.
Conclusion:
Thus, it can be concluded form the report that the ransomware attack caused a
widespread attack in the user data as well as in the economy of the world. The presence of
enhanced security protocol is thus needed to secure the system and protect the data and
information that is present.
securities in the connected device is another mitigation process, which involves detection of
malicious attacks to the system.
Conclusion:
Thus, it can be concluded form the report that the ransomware attack caused a
widespread attack in the user data as well as in the economy of the world. The presence of
enhanced security protocol is thus needed to secure the system and protect the data and
information that is present.

11SECURITY BREACHES
References:
Audiot, N. (2016). Playing defence against the Equation Group.
Boatman, K. (2015). Beware the Rise of Ransomware.
Boylan, R. J. (2015) The shadow government: its identification and analysis.'. New Dawn, (42),
21.
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B.,
& Alazab, M. (2017). Cyber Terrorism: Research Review: Research Report of the
Australian National University Cybercrime Observatory for the Korean Institute of
Criminology.
Caulfield, T., Ioannidis, C., & Pym, D. (2017). The US Vulnerabilities Equities Process: An
Economic Perspective.
Chinthapalli, K. (2017). The hackers holding hospitals to ransom. BMJ, 357, j2214.
Choi, K. S., Scott, T. M., & LeClair, D. P. (2016). Ransomware against police: diagnosis of risk
factors via application of cyber-routine activities theory. International Journal of
Forensic Science & Pathology.
Kharraz, A., Arshad, S., Mulliner, C., Robertson, W. K., & Kirda, E. (2016, August). UNVEIL:
A Large-Scale, Automated Approach to Detecting Ransomware. In USENIX Security
Symposium (pp. 757-772).
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference
References:
Audiot, N. (2016). Playing defence against the Equation Group.
Boatman, K. (2015). Beware the Rise of Ransomware.
Boylan, R. J. (2015) The shadow government: its identification and analysis.'. New Dawn, (42),
21.
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Broadhurst, R., Woodford-Smith, H., Maxim, D., Sabol, B., Orlando, S., Chapman-Schmidt, B.,
& Alazab, M. (2017). Cyber Terrorism: Research Review: Research Report of the
Australian National University Cybercrime Observatory for the Korean Institute of
Criminology.
Caulfield, T., Ioannidis, C., & Pym, D. (2017). The US Vulnerabilities Equities Process: An
Economic Perspective.
Chinthapalli, K. (2017). The hackers holding hospitals to ransom. BMJ, 357, j2214.
Choi, K. S., Scott, T. M., & LeClair, D. P. (2016). Ransomware against police: diagnosis of risk
factors via application of cyber-routine activities theory. International Journal of
Forensic Science & Pathology.
Kharraz, A., Arshad, S., Mulliner, C., Robertson, W. K., & Kirda, E. (2016, August). UNVEIL:
A Large-Scale, Automated Approach to Detecting Ransomware. In USENIX Security
Symposium (pp. 757-772).
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference

12SECURITY BREACHES
on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24).
Springer, Cham.
Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage. Network
Security, 2016(10), 8-17.
Martin, G., Kinross, J., & Hankin, C. (2017). Effective cybersecurity is fundamental to patient
safety.
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing
challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
Planqué, D. (2016). Cyber Threat Intelligence.
Sanger, D. (2016). Shadow brokers leak raises alarming question: Was the NSA hacked. New
York Times. Retrieved August, 27, 2016.
Shane, S., Mazzetti, M., & Rosenberg, M. (2017). WikiLeaks releases trove of alleged CIA
hacking documents. The New York Times, Mar.
Tuttle, H. (2016). Ransomware attacks pose growing threat. Risk Management, 63(4), 4.
van Der Walt, C. (2017). The impact of nation-state hacking on commercial cyber-
security. Computer Fraud & Security, 2017(4), 5-10.
on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24).
Springer, Cham.
Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage. Network
Security, 2016(10), 8-17.
Martin, G., Kinross, J., & Hankin, C. (2017). Effective cybersecurity is fundamental to patient
safety.
Pathak, D. P., & Nanded, Y. M. (2016). A dangerous trend of cybercrime: ransomware growing
challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
Planqué, D. (2016). Cyber Threat Intelligence.
Sanger, D. (2016). Shadow brokers leak raises alarming question: Was the NSA hacked. New
York Times. Retrieved August, 27, 2016.
Shane, S., Mazzetti, M., & Rosenberg, M. (2017). WikiLeaks releases trove of alleged CIA
hacking documents. The New York Times, Mar.
Tuttle, H. (2016). Ransomware attacks pose growing threat. Risk Management, 63(4), 4.
van Der Walt, C. (2017). The impact of nation-state hacking on commercial cyber-
security. Computer Fraud & Security, 2017(4), 5-10.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.