Ransomware is malicious software that encrypts files and requires a.docx

B

course material

Ransomware is malicious software that encrypts files and requires a
Ransomware is malicious software that encrypts files and requires a key to decrypt the
files. To get the files decrypted, the company or organization must typically pay the hackers
a large fee, often in Bitcoin or another cryptocurrency. It is important to note that
cryptocurrency payments are one-way transactions that are impossible to trace. There is
risk, too. If the hackers do not provide the organization with the decryption key after
payment, there is no refund.Hackers in recent years have targeted businesses such as
hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat
hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in
Florida.Read these brief articles from the UMGC library to learn about the ransomware
incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In.
New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom
to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the
ransom, it would need to either use backups to restore to an earlier network or system
state, or to rebuild its systems and data. In the case of the Baltimore city government, its
backup systems were also encrypted, so the city was unable to process real estate
transactions.Depending on the complexity of the environment and the amount of data
encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20
times the amount.What would you do if you were the cybersecurity analyst that had to
advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider
both sides of the argument by conducting internet research to understand the different
viewpoints. When you are ready, explain why you would or would not pay the ransom.If you
agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up
providing the decryption key to unlock the files or come back and ask for even more
money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if
the costs to restore far exceed the ransom?Are there ethical considerations? If your
organization pays, will other organizations be vulnerable to similar attacks on their
systems?Would you have a different decision if you were working for a small organization
like Mercury USA?

Recomendados

Depending on the complexity of the environment and the amount of.docx por
Depending on the complexity of the environment and the amount of.docxDepending on the complexity of the environment and the amount of.docx
Depending on the complexity of the environment and the amount of.docxsalmonpybus
5 visualizações2 slides
Running Head CYBERSECURITY1CYBERSECURITY 15.docx por
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxtodd271
10 visualizações14 slides
Five cyber threats to be careful in 2018 por
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
45 visualizações16 slides
Analysis Of BJG Cybersecurity Consultants por
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsHeidi Maestas
3 visualizações78 slides
Emerging Threats to Digital Payments - Is Your Business Ready por
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyChukwunonso Okoro, CFE, CAMS, CRISC
235 visualizações15 slides
The Effect Of Software Piracy por
The Effect Of Software PiracyThe Effect Of Software Piracy
The Effect Of Software PiracyApa Papers For Sale Trinity
10 visualizações25 slides

Mais conteúdo relacionado

Similar a Ransomware is malicious software that encrypts files and requires a.docx

Internet Threats and Risk Mitigation por
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
1.5K visualizações12 slides
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx por
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxtodd521
2 visualizações66 slides
Ransomware-as-a-Service: The business of distributing cyber attacks por
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksΔρ. Γιώργος K. Κασάπης
192 visualizações9 slides
Discuss similarities and differences between and Trojan.docx por
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
3 visualizações3 slides
Discuss similarities and differences between and Trojan.docx por
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
5 visualizações3 slides
PCI Compliance Analysis por
PCI Compliance AnalysisPCI Compliance Analysis
PCI Compliance AnalysisPamela Wright
2 visualizações80 slides

Similar a Ransomware is malicious software that encrypts files and requires a.docx(20)

Internet Threats and Risk Mitigation por BrandProtect
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
BrandProtect1.5K visualizações
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx por todd521
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
todd5212 visualizações
Discuss similarities and differences between and Trojan.docx por bkbk37
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk373 visualizações
Discuss similarities and differences between and Trojan.docx por write12
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write125 visualizações
PCI Compliance Analysis por Pamela Wright
PCI Compliance AnalysisPCI Compliance Analysis
PCI Compliance Analysis
Pamela Wright2 visualizações
87161911 selected-case-studies-on-cyber-crime por homeworkping4
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping44.2K visualizações
FBI And Cyber Crime | Crime Stoppers International por Scott Mills
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills1.7K visualizações
ihegc012 por Maksym Schipka
ihegc012ihegc012
ihegc012
Maksym Schipka90 visualizações
CS3: Cybersecurity Extortion & Fraud por Paige Rasid
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid4.4K visualizações
TME0212-49 por Bill Mitchell
TME0212-49TME0212-49
TME0212-49
Bill Mitchell98 visualizações
CC_Futureinc_Cyber Security por Alistair Blake
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake186 visualizações
Hacking Is A Practice Of Art And The Features Of Systems por Candice Him
Hacking Is A Practice Of Art And The Features Of SystemsHacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of Systems
Candice Him3 visualizações
Computer Crimes por Upekha Vandebona
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona4.5K visualizações
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous por Ethan S. Burger
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Ethan S. Burger145 visualizações
Examples Of Actus Reus In Cyber Crime por Carolina Cardona
Examples Of Actus Reus In Cyber CrimeExamples Of Actus Reus In Cyber Crime
Examples Of Actus Reus In Cyber Crime
Carolina Cardona5 visualizações

Mais de bkbk37

Rater Errors Associated with the Performance Management Systems.docx por
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docxbkbk37
5 visualizações1 slide
QUESTION FIRM PERFORMANCE Report financial data.docx por
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docxbkbk37
3 visualizações1 slide
Ratio analysis provides another set of patterns to evaluate before.docx por
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docxbkbk37
4 visualizações2 slides
Rates Negotiation Crisis Premium Paper Help.docx por
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docxbkbk37
3 visualizações1 slide
Rather than writing a literature review for your.docx por
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docxbkbk37
3 visualizações1 slide
Rather than focus on the treatment of chronic policies.docx por
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docxbkbk37
3 visualizações1 slide

Mais de bkbk37(20)

Rater Errors Associated with the Performance Management Systems.docx por bkbk37
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docx
bkbk375 visualizações
QUESTION FIRM PERFORMANCE Report financial data.docx por bkbk37
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docx
bkbk373 visualizações
Ratio analysis provides another set of patterns to evaluate before.docx por bkbk37
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docx
bkbk374 visualizações
Rates Negotiation Crisis Premium Paper Help.docx por bkbk37
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docx
bkbk373 visualizações
Rather than writing a literature review for your.docx por bkbk37
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docx
bkbk373 visualizações
Rather than focus on the treatment of chronic policies.docx por bkbk37
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docx
bkbk373 visualizações
Rapid Assessment of a Client.docx por bkbk37
Rapid Assessment of a Client.docxRapid Assessment of a Client.docx
Rapid Assessment of a Client.docx
bkbk373 visualizações
Rated Over iko na 5star 65 times.docx por bkbk37
Rated Over iko na 5star 65 times.docxRated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docx
bkbk374 visualizações
Ranking Universities systems Premium Paper Help.docx por bkbk37
Ranking Universities systems Premium Paper Help.docxRanking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docx
bkbk373 visualizações
Range of.docx por bkbk37
Range of.docxRange of.docx
Range of.docx
bkbk373 visualizações
Ralph Waldo Emerson.docx por bkbk37
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
bkbk373 visualizações
Randomised algorithms for travelling salesman problem.docx por bkbk37
Randomised algorithms for travelling salesman problem.docxRandomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docx
bkbk373 visualizações
Raising Minimum An explanation of the its.docx por bkbk37
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
bkbk373 visualizações
Raising Capital Create a document that you will present to.docx por bkbk37
Raising Capital Create a document that you will present to.docxRaising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docx
bkbk373 visualizações
Rail Project A goal of the Obama administration.docx por bkbk37
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
bkbk373 visualizações
Racism toward Indigenous peoples in Canada.docx por bkbk37
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
bkbk373 visualizações
Raffel jeans management decides that the units is most likely.docx por bkbk37
Raffel jeans management decides that the units is most likely.docxRaffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docx
bkbk373 visualizações
Race and.docx por bkbk37
Race and.docxRace and.docx
Race and.docx
bkbk373 visualizações
Race Presentations on TV Premium Paper Help.docx por bkbk37
Race Presentations on TV Premium Paper Help.docxRace Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docx
bkbk373 visualizações
R2P and Syria.docx por bkbk37
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
bkbk372 visualizações

Último

ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}DR .PALLAVI PATHANIA
240 visualizações195 slides
JiscOAWeek_LAIR_slides_October2023.pptx por
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
79 visualizações8 slides
Class 10 English notes 23-24.pptx por
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptxTARIQ KHAN
107 visualizações53 slides
The basics - information, data, technology and systems.pdf por
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdfJonathanCovena1
88 visualizações1 slide
discussion post.pdf por
discussion post.pdfdiscussion post.pdf
discussion post.pdfjessemercerail
120 visualizações1 slide

Último(20)

ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA240 visualizações
JiscOAWeek_LAIR_slides_October2023.pptx por Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc79 visualizações
Class 10 English notes 23-24.pptx por TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN107 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena188 visualizações
discussion post.pdf por jessemercerail
discussion post.pdfdiscussion post.pdf
discussion post.pdf
jessemercerail120 visualizações
Classification of crude drugs.pptx por GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 visualizações
American Psychological Association 7th Edition.pptx por SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi482 visualizações
Psychology KS4 por WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch68 visualizações
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx por Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard167 visualizações
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por SukhwinderSingh895865
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
SukhwinderSingh895865507 visualizações
The Open Access Community Framework (OACF) 2023 (1).pptx por Jisc
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
Jisc85 visualizações
Education and Diversity.pptx por DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar118 visualizações
UWP OA Week Presentation (1).pptx por Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc74 visualizações
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington141 visualizações
Community-led Open Access Publishing webinar.pptx por Jisc
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
Jisc74 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 545 visualizações
Universe revised.pdf por DrHafizKosar
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar112 visualizações
Psychology KS5 por WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch77 visualizações

Ransomware is malicious software that encrypts files and requires a.docx

  • 1. Ransomware is malicious software that encrypts files and requires a Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.Read these brief articles from the UMGC library to learn about the ransomware incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?Would you have a different decision if you were working for a small organization like Mercury USA?