Ransomware is malicious software that encrypts files and requires a.docx

B

course material

Ransomware is malicious software that encrypts files and requires a
Ransomware is malicious software that encrypts files and requires a key to decrypt the
files. To get the files decrypted, the company or organization must typically pay the hackers
a large fee, often in Bitcoin or another cryptocurrency. It is important to note that
cryptocurrency payments are one-way transactions that are impossible to trace. There is
risk, too. If the hackers do not provide the organization with the decryption key after
payment, there is no refund.Hackers in recent years have targeted businesses such as
hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat
hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in
Florida.Read these brief articles from the UMGC library to learn about the ransomware
incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In.
New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom
to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the
ransom, it would need to either use backups to restore to an earlier network or system
state, or to rebuild its systems and data. In the case of the Baltimore city government, its
backup systems were also encrypted, so the city was unable to process real estate
transactions.Depending on the complexity of the environment and the amount of data
encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20
times the amount.What would you do if you were the cybersecurity analyst that had to
advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider
both sides of the argument by conducting internet research to understand the different
viewpoints. When you are ready, explain why you would or would not pay the ransom.If you
agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up
providing the decryption key to unlock the files or come back and ask for even more
money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if
the costs to restore far exceed the ransom?Are there ethical considerations? If your
organization pays, will other organizations be vulnerable to similar attacks on their
systems?Would you have a different decision if you were working for a small organization
like Mercury USA?

Recomendados

Depending on the complexity of the environment and the amount of.docx por
Depending on the complexity of the environment and the amount of.docxDepending on the complexity of the environment and the amount of.docx
Depending on the complexity of the environment and the amount of.docxsalmonpybus
5 vistas2 diapositivas
Running Head CYBERSECURITY1CYBERSECURITY 15.docx por
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxtodd271
10 vistas14 diapositivas
Five cyber threats to be careful in 2018 por
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
45 vistas16 diapositivas
Analysis Of BJG Cybersecurity Consultants por
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsHeidi Maestas
3 vistas78 diapositivas
Emerging Threats to Digital Payments - Is Your Business Ready por
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyChukwunonso Okoro, CFE, CAMS, CRISC
235 vistas15 diapositivas
The Effect Of Software Piracy por
The Effect Of Software PiracyThe Effect Of Software Piracy
The Effect Of Software PiracyApa Papers For Sale Trinity
10 vistas25 diapositivas

Más contenido relacionado

Similar a Ransomware is malicious software that encrypts files and requires a.docx

Internet Threats and Risk Mitigation por
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
1.5K vistas12 diapositivas
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx por
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxtodd521
2 vistas66 diapositivas
Ransomware-as-a-Service: The business of distributing cyber attacks por
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksΔρ. Γιώργος K. Κασάπης
192 vistas9 diapositivas
Discuss similarities and differences between and Trojan.docx por
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
3 vistas3 diapositivas
Discuss similarities and differences between and Trojan.docx por
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
5 vistas3 diapositivas
PCI Compliance Analysis por
PCI Compliance AnalysisPCI Compliance Analysis
PCI Compliance AnalysisPamela Wright
2 vistas80 diapositivas

Similar a Ransomware is malicious software that encrypts files and requires a.docx(20)

Internet Threats and Risk Mitigation por BrandProtect
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
BrandProtect1.5K vistas
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx por todd521
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
todd5212 vistas
Discuss similarities and differences between and Trojan.docx por bkbk37
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk373 vistas
Discuss similarities and differences between and Trojan.docx por write12
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write125 vistas
87161911 selected-case-studies-on-cyber-crime por homeworkping4
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping44.2K vistas
FBI And Cyber Crime | Crime Stoppers International por Scott Mills
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills1.7K vistas
CS3: Cybersecurity Extortion & Fraud por Paige Rasid
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid4.4K vistas
CC_Futureinc_Cyber Security por Alistair Blake
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake186 vistas
Hacking Is A Practice Of Art And The Features Of Systems por Candice Him
Hacking Is A Practice Of Art And The Features Of SystemsHacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of Systems
Candice Him3 vistas
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous por Ethan S. Burger
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Ethan S. Burger145 vistas

Más de bkbk37

Rater Errors Associated with the Performance Management Systems.docx por
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docxbkbk37
5 vistas1 diapositiva
QUESTION FIRM PERFORMANCE Report financial data.docx por
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docxbkbk37
3 vistas1 diapositiva
Ratio analysis provides another set of patterns to evaluate before.docx por
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docxbkbk37
4 vistas2 diapositivas
Rates Negotiation Crisis Premium Paper Help.docx por
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docxbkbk37
3 vistas1 diapositiva
Rather than writing a literature review for your.docx por
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docxbkbk37
3 vistas1 diapositiva
Rather than focus on the treatment of chronic policies.docx por
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docxbkbk37
3 vistas1 diapositiva

Más de bkbk37(20)

Rater Errors Associated with the Performance Management Systems.docx por bkbk37
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docx
bkbk375 vistas
QUESTION FIRM PERFORMANCE Report financial data.docx por bkbk37
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docx
bkbk373 vistas
Ratio analysis provides another set of patterns to evaluate before.docx por bkbk37
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docx
bkbk374 vistas
Rates Negotiation Crisis Premium Paper Help.docx por bkbk37
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docx
bkbk373 vistas
Rather than writing a literature review for your.docx por bkbk37
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docx
bkbk373 vistas
Rather than focus on the treatment of chronic policies.docx por bkbk37
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docx
bkbk373 vistas
Rapid Assessment of a Client.docx por bkbk37
Rapid Assessment of a Client.docxRapid Assessment of a Client.docx
Rapid Assessment of a Client.docx
bkbk373 vistas
Rated Over iko na 5star 65 times.docx por bkbk37
Rated Over iko na 5star 65 times.docxRated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docx
bkbk374 vistas
Ranking Universities systems Premium Paper Help.docx por bkbk37
Ranking Universities systems Premium Paper Help.docxRanking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docx
bkbk373 vistas
Range of.docx por bkbk37
Range of.docxRange of.docx
Range of.docx
bkbk373 vistas
Ralph Waldo Emerson.docx por bkbk37
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
bkbk373 vistas
Randomised algorithms for travelling salesman problem.docx por bkbk37
Randomised algorithms for travelling salesman problem.docxRandomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docx
bkbk373 vistas
Raising Minimum An explanation of the its.docx por bkbk37
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
bkbk373 vistas
Raising Capital Create a document that you will present to.docx por bkbk37
Raising Capital Create a document that you will present to.docxRaising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docx
bkbk373 vistas
Rail Project A goal of the Obama administration.docx por bkbk37
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
bkbk373 vistas
Racism toward Indigenous peoples in Canada.docx por bkbk37
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
bkbk373 vistas
Raffel jeans management decides that the units is most likely.docx por bkbk37
Raffel jeans management decides that the units is most likely.docxRaffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docx
bkbk373 vistas
Race and.docx por bkbk37
Race and.docxRace and.docx
Race and.docx
bkbk373 vistas
Race Presentations on TV Premium Paper Help.docx por bkbk37
Race Presentations on TV Premium Paper Help.docxRace Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docx
bkbk373 vistas
R2P and Syria.docx por bkbk37
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
bkbk372 vistas

Último

11.30.23 Poverty and Inequality in America.pptx por
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptxmary850239
160 vistas33 diapositivas
Psychology KS5 por
Psychology KS5Psychology KS5
Psychology KS5WestHatch
93 vistas5 diapositivas
Class 10 English notes 23-24.pptx por
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptxTARIQ KHAN
131 vistas53 diapositivas
Dance KS5 Breakdown por
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 BreakdownWestHatch
79 vistas2 diapositivas
Education and Diversity.pptx por
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptxDrHafizKosar
173 vistas16 diapositivas
Psychology KS4 por
Psychology KS4Psychology KS4
Psychology KS4WestHatch
84 vistas4 diapositivas

Último(20)

11.30.23 Poverty and Inequality in America.pptx por mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239160 vistas
Psychology KS5 por WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch93 vistas
Class 10 English notes 23-24.pptx por TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN131 vistas
Dance KS5 Breakdown por WestHatch
Dance KS5 BreakdownDance KS5 Breakdown
Dance KS5 Breakdown
WestHatch79 vistas
Education and Diversity.pptx por DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar173 vistas
Psychology KS4 por WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch84 vistas
UWP OA Week Presentation (1).pptx por Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc88 vistas
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala97 vistas
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 585 vistas
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1486 vistas
Narration lesson plan.docx por TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN112 vistas
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL100 vistas
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239298 vistas
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P75 vistas

Ransomware is malicious software that encrypts files and requires a.docx

  • 1. Ransomware is malicious software that encrypts files and requires a Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.Read these brief articles from the UMGC library to learn about the ransomware incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?Would you have a different decision if you were working for a small organization like Mercury USA?