Ransomware is malicious software that encrypts files and requires a.docx

B

course material

Ransomware is malicious software that encrypts files and requires a
Ransomware is malicious software that encrypts files and requires a key to decrypt the
files. To get the files decrypted, the company or organization must typically pay the hackers
a large fee, often in Bitcoin or another cryptocurrency. It is important to note that
cryptocurrency payments are one-way transactions that are impossible to trace. There is
risk, too. If the hackers do not provide the organization with the decryption key after
payment, there is no refund.Hackers in recent years have targeted businesses such as
hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat
hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in
Florida.Read these brief articles from the UMGC library to learn about the ransomware
incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In.
New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom
to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the
ransom, it would need to either use backups to restore to an earlier network or system
state, or to rebuild its systems and data. In the case of the Baltimore city government, its
backup systems were also encrypted, so the city was unable to process real estate
transactions.Depending on the complexity of the environment and the amount of data
encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20
times the amount.What would you do if you were the cybersecurity analyst that had to
advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider
both sides of the argument by conducting internet research to understand the different
viewpoints. When you are ready, explain why you would or would not pay the ransom.If you
agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up
providing the decryption key to unlock the files or come back and ask for even more
money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if
the costs to restore far exceed the ransom?Are there ethical considerations? If your
organization pays, will other organizations be vulnerable to similar attacks on their
systems?Would you have a different decision if you were working for a small organization
like Mercury USA?

Recommandé

Depending on the complexity of the environment and the amount of.docx par
Depending on the complexity of the environment and the amount of.docxDepending on the complexity of the environment and the amount of.docx
Depending on the complexity of the environment and the amount of.docxsalmonpybus
5 vues2 diapositives
Running Head CYBERSECURITY1CYBERSECURITY 15.docx par
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxtodd271
10 vues14 diapositives
Five cyber threats to be careful in 2018 par
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
45 vues16 diapositives
Analysis Of BJG Cybersecurity Consultants par
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsHeidi Maestas
3 vues78 diapositives
Emerging Threats to Digital Payments - Is Your Business Ready par
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyChukwunonso Okoro, CFE, CAMS, CRISC
235 vues15 diapositives
The Effect Of Software Piracy par
The Effect Of Software PiracyThe Effect Of Software Piracy
The Effect Of Software PiracyApa Papers For Sale Trinity
10 vues25 diapositives

Contenu connexe

Similaire à Ransomware is malicious software that encrypts files and requires a.docx

Internet Threats and Risk Mitigation par
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
1.5K vues12 diapositives
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx par
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxtodd521
2 vues66 diapositives
Ransomware-as-a-Service: The business of distributing cyber attacks par
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksΔρ. Γιώργος K. Κασάπης
192 vues9 diapositives
Discuss similarities and differences between and Trojan.docx par
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
3 vues3 diapositives
Discuss similarities and differences between and Trojan.docx par
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
5 vues3 diapositives
PCI Compliance Analysis par
PCI Compliance AnalysisPCI Compliance Analysis
PCI Compliance AnalysisPamela Wright
2 vues80 diapositives

Similaire à Ransomware is malicious software that encrypts files and requires a.docx(20)

Internet Threats and Risk Mitigation par BrandProtect
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
BrandProtect1.5K vues
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx par todd521
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
todd5212 vues
Discuss similarities and differences between and Trojan.docx par bkbk37
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk373 vues
Discuss similarities and differences between and Trojan.docx par write12
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write125 vues
87161911 selected-case-studies-on-cyber-crime par homeworkping4
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping44.2K vues
FBI And Cyber Crime | Crime Stoppers International par Scott Mills
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
Scott Mills1.7K vues
CS3: Cybersecurity Extortion & Fraud par Paige Rasid
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid4.4K vues
Hacking Is A Practice Of Art And The Features Of Systems par Candice Him
Hacking Is A Practice Of Art And The Features Of SystemsHacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of Systems
Candice Him3 vues
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous par Ethan S. Burger
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Ethan S. Burger145 vues

Plus de bkbk37

Rater Errors Associated with the Performance Management Systems.docx par
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docxbkbk37
5 vues1 diapositive
QUESTION FIRM PERFORMANCE Report financial data.docx par
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docxbkbk37
3 vues1 diapositive
Ratio analysis provides another set of patterns to evaluate before.docx par
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docxbkbk37
4 vues2 diapositives
Rates Negotiation Crisis Premium Paper Help.docx par
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docxbkbk37
3 vues1 diapositive
Rather than writing a literature review for your.docx par
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docxbkbk37
3 vues1 diapositive
Rather than focus on the treatment of chronic policies.docx par
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docxbkbk37
3 vues1 diapositive

Plus de bkbk37(20)

Rater Errors Associated with the Performance Management Systems.docx par bkbk37
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docx
bkbk375 vues
QUESTION FIRM PERFORMANCE Report financial data.docx par bkbk37
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docx
bkbk373 vues
Ratio analysis provides another set of patterns to evaluate before.docx par bkbk37
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docx
bkbk374 vues
Rates Negotiation Crisis Premium Paper Help.docx par bkbk37
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docx
bkbk373 vues
Rather than writing a literature review for your.docx par bkbk37
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docx
bkbk373 vues
Rather than focus on the treatment of chronic policies.docx par bkbk37
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docx
bkbk373 vues
Rapid Assessment of a Client.docx par bkbk37
Rapid Assessment of a Client.docxRapid Assessment of a Client.docx
Rapid Assessment of a Client.docx
bkbk373 vues
Rated Over iko na 5star 65 times.docx par bkbk37
Rated Over iko na 5star 65 times.docxRated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docx
bkbk374 vues
Ranking Universities systems Premium Paper Help.docx par bkbk37
Ranking Universities systems Premium Paper Help.docxRanking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docx
bkbk373 vues
Range of.docx par bkbk37
Range of.docxRange of.docx
Range of.docx
bkbk373 vues
Ralph Waldo Emerson.docx par bkbk37
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
bkbk373 vues
Randomised algorithms for travelling salesman problem.docx par bkbk37
Randomised algorithms for travelling salesman problem.docxRandomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docx
bkbk373 vues
Raising Minimum An explanation of the its.docx par bkbk37
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
bkbk373 vues
Raising Capital Create a document that you will present to.docx par bkbk37
Raising Capital Create a document that you will present to.docxRaising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docx
bkbk373 vues
Rail Project A goal of the Obama administration.docx par bkbk37
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
bkbk373 vues
Racism toward Indigenous peoples in Canada.docx par bkbk37
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
bkbk373 vues
Raffel jeans management decides that the units is most likely.docx par bkbk37
Raffel jeans management decides that the units is most likely.docxRaffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docx
bkbk373 vues
Race and.docx par bkbk37
Race and.docxRace and.docx
Race and.docx
bkbk373 vues
Race Presentations on TV Premium Paper Help.docx par bkbk37
Race Presentations on TV Premium Paper Help.docxRace Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docx
bkbk373 vues
R2P and Syria.docx par bkbk37
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
bkbk372 vues

Dernier

Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx par
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
96 vues57 diapositives
GCSE Music par
GCSE MusicGCSE Music
GCSE MusicWestHatch
47 vues50 diapositives
Retail Store Scavenger Hunt.pptx par
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptxjmurphy154
47 vues10 diapositives
Thanksgiving!.pdf par
Thanksgiving!.pdfThanksgiving!.pdf
Thanksgiving!.pdfEnglishCEIPdeSigeiro
401 vues17 diapositives
Recap of our Class par
Recap of our ClassRecap of our Class
Recap of our ClassCorinne Weisgerber
100 vues15 diapositives
GCSE Spanish par
GCSE SpanishGCSE Spanish
GCSE SpanishWestHatch
53 vues166 diapositives

Dernier(20)

Retail Store Scavenger Hunt.pptx par jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15447 vues
When Sex Gets Complicated: Porn, Affairs, & Cybersex par Marlene Maheu
When Sex Gets Complicated: Porn, Affairs, & CybersexWhen Sex Gets Complicated: Porn, Affairs, & Cybersex
When Sex Gets Complicated: Porn, Affairs, & Cybersex
Marlene Maheu99 vues
REPRESENTATION - GAUNTLET.pptx par iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood151 vues
EILO EXCURSION PROGRAMME 2023 par info33492
EILO EXCURSION PROGRAMME 2023EILO EXCURSION PROGRAMME 2023
EILO EXCURSION PROGRAMME 2023
info33492124 vues
JQUERY.pdf par ArthyR3
JQUERY.pdfJQUERY.pdf
JQUERY.pdf
ArthyR396 vues
Create a Structure in VBNet.pptx par Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P80 vues

Ransomware is malicious software that encrypts files and requires a.docx

  • 1. Ransomware is malicious software that encrypts files and requires a Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.Read these brief articles from the UMGC library to learn about the ransomware incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?Would you have a different decision if you were working for a small organization like Mercury USA?