1
Cyber Security; Ransomware
Muhammad Taimur Ali
APUS
INTL 649
Marian Leerburger
Oct 21,2021
2
Introduction
Ransomware is a form of malware that encodes targeted files of victims. This form of
malware affects many people in the United States, and usually, there is a solution. From the word
“ransom”, the attackers demands payment before they allow the victim to access their files.
Ransomware can be devastating to the victim as the amount wanted may be huge and cause
inconveniences to the user. The information on the computer is usually hidden and might be
important to the victim. In most cases, the attackers give users instructions on how to pay the
required ransom. The hacker threatens the victims if they do not pay the required amount on a
specific time. They might threaten them about deleting their essential information, among other
forms of intimidation. Ransomware merits further discussions and solutions as many people have
fallen victims to such attacks. The nature of ransomware and how it works and effects the most
people.This does not make sense as written and has incorrect or missing wording. The effective
up to date solutions on how to deal with ransomware cases will be discussed. You cannot state
what the paper will do. Rather, you must have a clear and effective thesis as the last sentence of
the introduction. The thesis is an argument in statement form and in your own words that you
would support and develop throughout the paper. Without a clear thesis, the paper will lack
direction.
Background
Many people often wonder how hackers access one's computer and demand ransom from
users. There are several ways individuals can hack someone's computer. One of the most
common ways ransomware can occur is through phishing spam. Good method to bring up. This
is an attachment that comes to a computer user as an email and looks legit legitimate (wrote out
entire wording). The user opens itthe attachment, thinking it is a trustable documentcomma only
3
to be duped. Once the user downloads or opens themthe attachments, or allows them the
attachments to access another document in their the user’s (watch plural vs singular confusion
and avoid unfocused wording) computer, they the malware on these attachments automatically
take over the computer, especially if the malware? What wording did you mean here? it has a
built-in social engineering tool. Notley is an aggressive form of ransomware that passes the
security holes straight to the computer without using any tricks on the user.1 This form of
malware It automatically infects computers without using any tricks. After taking over a victim's
computer, the malware begins, and it becomes difficult for the user to access different
information. The most common effect malware does is encrypt the user's files. It can encrypt all
files or some depending on the information they want to use against the victim. The encrypted
files cannot be decrypted unless it is the attacker. The attackers have a mathematical key that can
assist in decrypting, and it is up to them. Individuals need to know that attackers come in
different ways and need to report these and more forms of cyberbullying. You need to avoid
unfocused wording like it and they, used often here. Your subject was often lost.
Research shows that ransomware targets are usually big organizations that are ready to
give money in exchange for confidentiality.Good start to the paragraph. Organizations likely to
suffer are universities because of their smaller security teams and disparate user base. It is easier
to penetrate to universities apostrophe systems because they?? do a lot of sharing.2 Other
1
Fruhlinger, Josh. "Ransomware explained: How it works and how to remove it." CSO
United States. Last modified 2020. https://www.csoonline.com/article/3236183/what-is-
ransomware-how-it-works-and-how-to-remove-it.html.
2
Kaspersky. "Ransomware Attacks and Types – How Encryption Trojans Differ."
Kaspersky. Last modified 2020.
https://www.kaspersky.com/resource-center/threats/ransomware-attacks-and-types.
4
organizations likely to experience ransomware include government agencies, medical facilities,
and law firms. These organizations keep their information private, and when they are threatened
by leaking their data, they are likely to pay a ransom. However, nobody should feel safe because
ransomware can happen to any internet user and does not necessarily focus on big organizations.
Again, that is true.
Solutions
There are several ways to prevent ransomwareGood start here. . This solution what
solution? You haven’t mentioned a solution het….dramatically assists many computers users by
reducing their chances of facing the attacker. One of the main ways to prevent ransomware is to
keep one’s operating system up to date. Keeping it system patched to date ensures the hacker has
fewer chances of exploiting that systemit. Another way to prevent ransomware is to avoid
installing or giving access to software that one is unsure about. Good to note. Installing antivirus
software detects malicious programs like ransomware and blocks them. Whitelisting software, on
the other hand, prevents unauthorized data from being executed. LastlyFinally, backing up files
may help retrieve some vital information after a ransomware attack. Despite these ideas having
an impact on ransomware attacks, they also have some disadvantages. For instance, keeping one
operating system patched to date reduces the chances of ransomware but does not guarantee
safety at all.3 That is important to bring up. Another pro what is “pro”? This is not a complete
word. from the mentioned solutions is that whitelisting can fail, allowing a ransomware attack.
Most of the solutions to prevent ransomware attacks are not guaranteed; hence, there is a lack of
security in many information in individuals' computers.Good point. Other solutions come after
3
National Cyber Security Center. "Mitigating malware and ransomware attacks."
National Cyber Security Center. Last modified 2020.
https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks.
5
the computer has experienced a ransom attack. These solutions include rebooting windows to
safe mode (applicable to windows 10), scanning the computer to find the ransomware program,
and restoring the computer to its previous state.
Conclusion
Ransomware affects a considerable number of people in society. It This type of attack on
computers has contributed to many organizations paying vast amounts of money in exchange for
the confidentiality of their information. The act has increased over the years, with perpetrators
targeting individuals with money and organizations whose information does not need to leak.
Different solutions have assisted organizations in protecting themselves from ransomware acts.
Ransomware being common has raised awareness on the safety of computers and what
governments are doing to ensure cyber security is better. Many organizations have fallen into
attackers' traps and paid huge money to retrieve their information.Good information in the
conclusion.
6
Bibliography
Fruhlinger, Josh. "Ransomware explained: How it works and how to remove it." CSO United
States. Last modified 2020. https://www.csoonline.com/article/3236183/what-is-
ransomware-how-it-works-and-how-to-remove-it.html.
Kaspersky. "Ransomware Attacks and Types – How Encryption Trojans Differ." Kaspersky.
Last modified 2020. https://www.kaspersky.com/resource-center/threats/ransomware-
attacks-and-types.
National Cyber Security Center. "Mitigating malware and ransomware attacks." National Cyber
Security Center. Last modified 2020. https://www.ncsc.gov.uk/guidance/mitigating-
malware-and-ransomware-attacks.