0% found this document useful (0 votes)
69 views6 pages

ALI Assignment 1

The document discusses ransomware, a type of malware that encrypts victims' files and demands payment for access. It highlights the methods of attack, particularly through phishing, and identifies vulnerable targets such as universities and organizations that handle sensitive information. The paper also outlines prevention strategies, including keeping systems updated and using antivirus software, while acknowledging that no solution guarantees complete safety.

Uploaded by

Taimur Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views6 pages

ALI Assignment 1

The document discusses ransomware, a type of malware that encrypts victims' files and demands payment for access. It highlights the methods of attack, particularly through phishing, and identifies vulnerable targets such as universities and organizations that handle sensitive information. The paper also outlines prevention strategies, including keeping systems updated and using antivirus software, while acknowledging that no solution guarantees complete safety.

Uploaded by

Taimur Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1

Cyber Security; Ransomware

Muhammad Taimur Ali

APUS

INTL 649

Marian Leerburger

Oct 21,2021
2

Introduction

Ransomware is a form of malware that encodes targeted files of victims. This form of

malware affects many people in the United States, and usually, there is a solution. From the word

“ransom”, the attackers demands payment before they allow the victim to access their files.

Ransomware can be devastating to the victim as the amount wanted may be huge and cause

inconveniences to the user. The information on the computer is usually hidden and might be

important to the victim. In most cases, the attackers give users instructions on how to pay the

required ransom. The hacker threatens the victims if they do not pay the required amount on a

specific time. They might threaten them about deleting their essential information, among other

forms of intimidation. Ransomware merits further discussions and solutions as many people have

fallen victims to such attacks. The nature of ransomware and how it works and effects the most

people.This does not make sense as written and has incorrect or missing wording. The effective

up to date solutions on how to deal with ransomware cases will be discussed. You cannot state

what the paper will do. Rather, you must have a clear and effective thesis as the last sentence of

the introduction. The thesis is an argument in statement form and in your own words that you

would support and develop throughout the paper. Without a clear thesis, the paper will lack

direction.

Background

Many people often wonder how hackers access one's computer and demand ransom from

users. There are several ways individuals can hack someone's computer. One of the most

common ways ransomware can occur is through phishing spam. Good method to bring up. This

is an attachment that comes to a computer user as an email and looks legit legitimate (wrote out

entire wording). The user opens itthe attachment, thinking it is a trustable documentcomma only
3

to be duped. Once the user downloads or opens themthe attachments, or allows them the

attachments to access another document in their the user’s (watch plural vs singular confusion

and avoid unfocused wording) computer, they the malware on these attachments automatically

take over the computer, especially if the malware? What wording did you mean here? it has a

built-in social engineering tool. Notley is an aggressive form of ransomware that passes the

security holes straight to the computer without using any tricks on the user.1 This form of

malware It automatically infects computers without using any tricks. After taking over a victim's

computer, the malware begins, and it becomes difficult for the user to access different

information. The most common effect malware does is encrypt the user's files. It can encrypt all

files or some depending on the information they want to use against the victim. The encrypted

files cannot be decrypted unless it is the attacker. The attackers have a mathematical key that can

assist in decrypting, and it is up to them. Individuals need to know that attackers come in

different ways and need to report these and more forms of cyberbullying. You need to avoid

unfocused wording like it and they, used often here. Your subject was often lost.

Research shows that ransomware targets are usually big organizations that are ready to

give money in exchange for confidentiality.Good start to the paragraph. Organizations likely to

suffer are universities because of their smaller security teams and disparate user base. It is easier

to penetrate to universities apostrophe systems because they?? do a lot of sharing.2 Other


1
Fruhlinger, Josh. "Ransomware explained: How it works and how to remove it." CSO
United States. Last modified 2020. https://www.csoonline.com/article/3236183/what-is-
ransomware-how-it-works-and-how-to-remove-it.html.

2
Kaspersky. "Ransomware Attacks and Types – How Encryption Trojans Differ."
Kaspersky. Last modified 2020.
https://www.kaspersky.com/resource-center/threats/ransomware-attacks-and-types.
4

organizations likely to experience ransomware include government agencies, medical facilities,

and law firms. These organizations keep their information private, and when they are threatened

by leaking their data, they are likely to pay a ransom. However, nobody should feel safe because

ransomware can happen to any internet user and does not necessarily focus on big organizations.

Again, that is true.

Solutions

There are several ways to prevent ransomwareGood start here. . This solution what

solution? You haven’t mentioned a solution het….dramatically assists many computers users by

reducing their chances of facing the attacker. One of the main ways to prevent ransomware is to

keep one’s operating system up to date. Keeping it system patched to date ensures the hacker has

fewer chances of exploiting that systemit. Another way to prevent ransomware is to avoid

installing or giving access to software that one is unsure about. Good to note. Installing antivirus

software detects malicious programs like ransomware and blocks them. Whitelisting software, on

the other hand, prevents unauthorized data from being executed. LastlyFinally, backing up files

may help retrieve some vital information after a ransomware attack. Despite these ideas having

an impact on ransomware attacks, they also have some disadvantages. For instance, keeping one

operating system patched to date reduces the chances of ransomware but does not guarantee

safety at all.3 That is important to bring up. Another pro what is “pro”? This is not a complete

word. from the mentioned solutions is that whitelisting can fail, allowing a ransomware attack.

Most of the solutions to prevent ransomware attacks are not guaranteed; hence, there is a lack of

security in many information in individuals' computers.Good point. Other solutions come after
3
National Cyber Security Center. "Mitigating malware and ransomware attacks."
National Cyber Security Center. Last modified 2020.
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks.
5

the computer has experienced a ransom attack. These solutions include rebooting windows to

safe mode (applicable to windows 10), scanning the computer to find the ransomware program,

and restoring the computer to its previous state.

Conclusion

Ransomware affects a considerable number of people in society. It This type of attack on

computers has contributed to many organizations paying vast amounts of money in exchange for

the confidentiality of their information. The act has increased over the years, with perpetrators

targeting individuals with money and organizations whose information does not need to leak.

Different solutions have assisted organizations in protecting themselves from ransomware acts.

Ransomware being common has raised awareness on the safety of computers and what

governments are doing to ensure cyber security is better. Many organizations have fallen into

attackers' traps and paid huge money to retrieve their information.Good information in the

conclusion.
6

Bibliography

Fruhlinger, Josh. "Ransomware explained: How it works and how to remove it." CSO United

States. Last modified 2020. https://www.csoonline.com/article/3236183/what-is-

ransomware-how-it-works-and-how-to-remove-it.html.

Kaspersky. "Ransomware Attacks and Types – How Encryption Trojans Differ." Kaspersky.

Last modified 2020. https://www.kaspersky.com/resource-center/threats/ransomware-

attacks-and-types.

National Cyber Security Center. "Mitigating malware and ransomware attacks." National Cyber

Security Center. Last modified 2020. https://www.ncsc.gov.uk/guidance/mitigating-

malware-and-ransomware-attacks.

You might also like