SlideShare una empresa de Scribd logo
1 de 10
RANSOMWARE
BY: MIR MURTAZA SHAIKH (IS-029/22-23)
TABLE OF CONTENTS
• INTRODUCTION
• TYPES OF RANSOMWARE
• IMPACT OF RANSOMWARE
• DISTRIBUTION AND INSTALLATION
• PREVENTION AND RESPONSE
• CURRENT TRENDS AND FUTURE PREDICTIONS
• CONCLUSION
WHAT IS MALWARE:
MALWARE IS SHORT FOR "MALICIOUS SOFTWARE". IT IS ANY SOFTWARE THAT IS DESIGNED TO
HARM OR EXPLOIT A COMPUTER SYSTEM OR NETWORK. THERE ARE MANY DIFFERENT TYPES OF
MALWARE, INCLUDING
 VIRUS
 WORMS
 TROJAN
 ADWARE
 SPYWARE
 RANSOMWARE
IT IS IMPORTANT TO NOTE THAT MALWARE CAN BE DISTRIBUTED IN VARIOUS WAYS, SUCH AS
THROUGH PHISHING EMAILS, INFECTED SOFTWARE DOWNLOADS, OR EXPLOITING VULNERABILITIES
IN SOFTWARE, MALVERTISING, SOCIAL ENGINEERING, USB DRIVES.
INTRODUCTION:
RANSOMWARE IS A TYPE OF MALICIOUS SOFTWARE (MALWARE) THAT ENCRYPTS A VICTIM'S ASSISTS
AND DEMANDS A RANSOM PAYMENT IN EXCHANGE FOR THE DECRYPTION KEY. IT IS A GROWING
THREAT TO INDIVIDUALS AND ORGANIZATIONS, AS IT CAN CAUSE SIGNIFICANT FINANCIAL AND
OPERATIONAL DAMAGE.
WHAT CAN BE ENCRYPTED:
 PERSONAL DOCUMENTS: FILES LIKE WORD DOCUMENTS, EXCEL SPREADSHEETS, AND PDFS
 PHOTOS AND VIDEOS
 MUSIC AND AUDIO FILES
 BACKUP FILES
 AND MAY MORE
THE RANSOMWARE ENCRYPTS THE VICTIM'S FILES AND DISPLAYS A RANSOM DEMAND, TYPICALLY IN
THE FORM OF A POP-UP MESSAGE OR LOCK SCREEN. THE RANSOM DEMAND USUALLY INCLUDES A
DEADLINE FOR PAYMENT, AND THE ATTACKERS MAY THREATEN TO DELETE OR PERMANENTLY
ENCRYPT THE VICTIM'S FILES IF THE RANSOM IS NOT PAID.
TYPES OF RANSOMWARE
THERE ARE SEVERAL TYPES OF RANSOMWARE THAT DIFFER BASED ON THE METHODS THEY USE TO
ENCRYPT FILES, THE WAY THEY SPREAD AND THE TYPE OF RANSOM DEMANDED. HERE ARE A FEW
COMMON TYPES OF RANSOMWARE:
 ENCRYPTING RANSOMWARE
 LOCKER RANSOMWARE
 SCAREWARE
 RANSOMWARE-AS-A-SERVICE (RAAS)
 MOBILE RANSOMWARE
 AND MANY MORE
IT'S IMPORTANT TO NOTE THAT NEW TYPES OF RANSOMWARE ARE CONSTANTLY BEING DEVELOPED,
AND THE THREAT LANDSCAPE IS CONSTANTLY CHANGING.
IMPACT OF RANSOMWARE
RANSOMWARE CAN HAVE A SIGNIFICANT IMPACT ON BOTH INDIVIDUALS AND ORGANIZATIONS,
INCLUDING:
 FINANCIAL LOSS
 DATA LOSS
 DOWNTIME
 REPUTATION DAMAGE
 LEGAL AND COMPLIANCE ISSUES
 INCREASED CYBERSECURITY COSTS
IT IS IMPORTANT TO NOTE THAT THE IMPACT OF A RANSOMWARE ATTACK CAN VARY DEPENDING ON THE
TYPE OF RANSOMWARE, THE SCOPE OF THE ATTACK, AND THE PREPAREDNESS OF THE VICTIM.
DISTRIBUTION AND INSTALLATION
PREVENTION AND RESPONSE
PREVENTING AND RESPONDING TO A RANSOMWARE ATTACK CAN BE COMPLEX AND CHALLENGING,
BUT THERE ARE SEVERAL BEST PRACTICES THAT CAN HELP TO MINIMIZE THE IMPACT OF AN ATTACK.
HERE ARE A FEW RECOMMENDATIONS FOR PREVENTING AND RESPONDING TO A RANSOMWARE
ATTACK:
 KEEP SOFTWARE AND OPERATING SYSTEMS UPDATED:.
 USE ANTI-VIRUS AND ANTI-MALWARE SOFTWARE.
 REGULARLY BACKUP IMPORTANT DATA.
 BE CAUTIOUS WHEN CLICKING ON LINKS OR DOWNLOADING ATTACHMENTS FROM UNKNOWN OR
SUSPICIOUS SOURCES.
 IMPLEMENT SECURITY AWARENESS TRAINING.
 DO NOT PAY THE RANSOM.
CURRENT TRENDS AND FUTURE PREDICTIONS
THE RANSOMWARE THREAT LANDSCAPE IS CONSTANTLY EVOLVING, AND NEW TRENDS AND
PREDICTIONS ARE EMERGING. HERE ARE A FEW CURRENT TRENDS AND FUTURE PREDICTIONS RELATED
TO RANSOMWARE:
• RANSOMWARE-AS-A-SERVICE (RAAS)
• TARGETING OF SPECIFIC INDUSTRIES
• USE OF CLOUD SERVICES
• INCREASE IN MOBILE RANSOMWARE
• INCREASE IN ATTACKS ON INTERNET OF THINGS (IOT) DEVICES
IT'S IMPORTANT TO NOTE THAT THESE TRENDS AND PREDICTIONS MAY CHANGE OVER TIME, AS THE
THREAT LANDSCAPE IS CONSTANTLY EVOLVING. IT'S ALWAYS RECOMMENDED TO STAY INFORMED
ABOUT THE LATEST TRENDS AND BEST PRACTICES FOR PROTECTING AGAINST RANSOMWARE ATTACKS.
CONCLUSION
• RANSOMWARE IS A MALICIOUS SOFTWARE THAT ENCRYPTS A VICTIM'S FILES AND DEMANDS A
RANSOM PAYMENT IN EXCHANGE FOR THE DECRYPTION KEY. IT CAN CAUSE SIGNIFICANT
FINANCIAL AND OPERATIONAL DAMAGE AND THE THREAT LANDSCAPE IS CONSTANTLY EVOLVING.
TO PREVENT AND RESPOND TO A RANSOMWARE ATTACK, IT IS IMPORTANT TO IMPLEMENT A
MULTI-LAYERED APPROACH INCLUDING REGULAR UPDATES, BACKUPS, SECURITY AWARENESS AND
INCIDENT RESPONSE PLAN.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Physical security
Physical securityPhysical security
Physical security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Ransomware
Ransomware Ransomware
Ransomware
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
information security
information securityinformation security
information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Information security
Information securityInformation security
Information security
 
Hacking
HackingHacking
Hacking
 

Similar a Ransomware Presentation.pptx

Ransomware: What it is and Strategies to prevent infection
Ransomware: What it is and Strategies to prevent infectionRansomware: What it is and Strategies to prevent infection
Ransomware: What it is and Strategies to prevent infectionDonald McArthur
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomwarevikash saini
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:Nancy Nimmegeers
 
How ransomware can hold your business hostage
How ransomware can hold your business hostageHow ransomware can hold your business hostage
How ransomware can hold your business hostageTom Mellish
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWareUmer Saeed
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowJeremiah Grossman
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideSarah Roberts
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices EyesOpen Association
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client AlertRobyn Melnyk
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgChristopher R. Ward
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013- Mark - Fullbright
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware AttacksEmily Brown
 

Similar a Ransomware Presentation.pptx (20)

Ransomware: What it is and Strategies to prevent infection
Ransomware: What it is and Strategies to prevent infectionRansomware: What it is and Strategies to prevent infection
Ransomware: What it is and Strategies to prevent infection
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomware
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Cybersecurity #SciChallenge2017
Cybersecurity #SciChallenge2017Cybersecurity #SciChallenge2017
Cybersecurity #SciChallenge2017
 
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:
 
How ransomware can hold your business hostage
How ransomware can hold your business hostageHow ransomware can hold your business hostage
How ransomware can hold your business hostage
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Ransomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to KnowRansomware is Here: Fundamentals Everyone Needs to Know
Ransomware is Here: Fundamentals Everyone Needs to Know
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
Ransomware : Challenges and best practices
Ransomware : Challenges and best practices Ransomware : Challenges and best practices
Ransomware : Challenges and best practices
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Web Security.pptx
Web Security.pptxWeb Security.pptx
Web Security.pptx
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
 

Último

Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Último (20)

Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Ransomware Presentation.pptx

  • 1. RANSOMWARE BY: MIR MURTAZA SHAIKH (IS-029/22-23)
  • 2. TABLE OF CONTENTS • INTRODUCTION • TYPES OF RANSOMWARE • IMPACT OF RANSOMWARE • DISTRIBUTION AND INSTALLATION • PREVENTION AND RESPONSE • CURRENT TRENDS AND FUTURE PREDICTIONS • CONCLUSION
  • 3. WHAT IS MALWARE: MALWARE IS SHORT FOR "MALICIOUS SOFTWARE". IT IS ANY SOFTWARE THAT IS DESIGNED TO HARM OR EXPLOIT A COMPUTER SYSTEM OR NETWORK. THERE ARE MANY DIFFERENT TYPES OF MALWARE, INCLUDING  VIRUS  WORMS  TROJAN  ADWARE  SPYWARE  RANSOMWARE IT IS IMPORTANT TO NOTE THAT MALWARE CAN BE DISTRIBUTED IN VARIOUS WAYS, SUCH AS THROUGH PHISHING EMAILS, INFECTED SOFTWARE DOWNLOADS, OR EXPLOITING VULNERABILITIES IN SOFTWARE, MALVERTISING, SOCIAL ENGINEERING, USB DRIVES.
  • 4. INTRODUCTION: RANSOMWARE IS A TYPE OF MALICIOUS SOFTWARE (MALWARE) THAT ENCRYPTS A VICTIM'S ASSISTS AND DEMANDS A RANSOM PAYMENT IN EXCHANGE FOR THE DECRYPTION KEY. IT IS A GROWING THREAT TO INDIVIDUALS AND ORGANIZATIONS, AS IT CAN CAUSE SIGNIFICANT FINANCIAL AND OPERATIONAL DAMAGE. WHAT CAN BE ENCRYPTED:  PERSONAL DOCUMENTS: FILES LIKE WORD DOCUMENTS, EXCEL SPREADSHEETS, AND PDFS  PHOTOS AND VIDEOS  MUSIC AND AUDIO FILES  BACKUP FILES  AND MAY MORE THE RANSOMWARE ENCRYPTS THE VICTIM'S FILES AND DISPLAYS A RANSOM DEMAND, TYPICALLY IN THE FORM OF A POP-UP MESSAGE OR LOCK SCREEN. THE RANSOM DEMAND USUALLY INCLUDES A DEADLINE FOR PAYMENT, AND THE ATTACKERS MAY THREATEN TO DELETE OR PERMANENTLY ENCRYPT THE VICTIM'S FILES IF THE RANSOM IS NOT PAID.
  • 5. TYPES OF RANSOMWARE THERE ARE SEVERAL TYPES OF RANSOMWARE THAT DIFFER BASED ON THE METHODS THEY USE TO ENCRYPT FILES, THE WAY THEY SPREAD AND THE TYPE OF RANSOM DEMANDED. HERE ARE A FEW COMMON TYPES OF RANSOMWARE:  ENCRYPTING RANSOMWARE  LOCKER RANSOMWARE  SCAREWARE  RANSOMWARE-AS-A-SERVICE (RAAS)  MOBILE RANSOMWARE  AND MANY MORE IT'S IMPORTANT TO NOTE THAT NEW TYPES OF RANSOMWARE ARE CONSTANTLY BEING DEVELOPED, AND THE THREAT LANDSCAPE IS CONSTANTLY CHANGING.
  • 6. IMPACT OF RANSOMWARE RANSOMWARE CAN HAVE A SIGNIFICANT IMPACT ON BOTH INDIVIDUALS AND ORGANIZATIONS, INCLUDING:  FINANCIAL LOSS  DATA LOSS  DOWNTIME  REPUTATION DAMAGE  LEGAL AND COMPLIANCE ISSUES  INCREASED CYBERSECURITY COSTS IT IS IMPORTANT TO NOTE THAT THE IMPACT OF A RANSOMWARE ATTACK CAN VARY DEPENDING ON THE TYPE OF RANSOMWARE, THE SCOPE OF THE ATTACK, AND THE PREPAREDNESS OF THE VICTIM.
  • 8. PREVENTION AND RESPONSE PREVENTING AND RESPONDING TO A RANSOMWARE ATTACK CAN BE COMPLEX AND CHALLENGING, BUT THERE ARE SEVERAL BEST PRACTICES THAT CAN HELP TO MINIMIZE THE IMPACT OF AN ATTACK. HERE ARE A FEW RECOMMENDATIONS FOR PREVENTING AND RESPONDING TO A RANSOMWARE ATTACK:  KEEP SOFTWARE AND OPERATING SYSTEMS UPDATED:.  USE ANTI-VIRUS AND ANTI-MALWARE SOFTWARE.  REGULARLY BACKUP IMPORTANT DATA.  BE CAUTIOUS WHEN CLICKING ON LINKS OR DOWNLOADING ATTACHMENTS FROM UNKNOWN OR SUSPICIOUS SOURCES.  IMPLEMENT SECURITY AWARENESS TRAINING.  DO NOT PAY THE RANSOM.
  • 9. CURRENT TRENDS AND FUTURE PREDICTIONS THE RANSOMWARE THREAT LANDSCAPE IS CONSTANTLY EVOLVING, AND NEW TRENDS AND PREDICTIONS ARE EMERGING. HERE ARE A FEW CURRENT TRENDS AND FUTURE PREDICTIONS RELATED TO RANSOMWARE: • RANSOMWARE-AS-A-SERVICE (RAAS) • TARGETING OF SPECIFIC INDUSTRIES • USE OF CLOUD SERVICES • INCREASE IN MOBILE RANSOMWARE • INCREASE IN ATTACKS ON INTERNET OF THINGS (IOT) DEVICES IT'S IMPORTANT TO NOTE THAT THESE TRENDS AND PREDICTIONS MAY CHANGE OVER TIME, AS THE THREAT LANDSCAPE IS CONSTANTLY EVOLVING. IT'S ALWAYS RECOMMENDED TO STAY INFORMED ABOUT THE LATEST TRENDS AND BEST PRACTICES FOR PROTECTING AGAINST RANSOMWARE ATTACKS.
  • 10. CONCLUSION • RANSOMWARE IS A MALICIOUS SOFTWARE THAT ENCRYPTS A VICTIM'S FILES AND DEMANDS A RANSOM PAYMENT IN EXCHANGE FOR THE DECRYPTION KEY. IT CAN CAUSE SIGNIFICANT FINANCIAL AND OPERATIONAL DAMAGE AND THE THREAT LANDSCAPE IS CONSTANTLY EVOLVING. TO PREVENT AND RESPOND TO A RANSOMWARE ATTACK, IT IS IMPORTANT TO IMPLEMENT A MULTI-LAYERED APPROACH INCLUDING REGULAR UPDATES, BACKUPS, SECURITY AWARENESS AND INCIDENT RESPONSE PLAN.