SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
1/20
Contents:
Basic Introduction and Countermeasures to
Ransomware Threats
Darwish Ahmad Herati1
, A.M.Bojamma2
, Dr.M.P. Indira Gandhi3
[1]. Department of Computer Science, St. Joseph’s College Bangalore
[2]. Assistant Professor, Department of Computer Science, St. Joseph’s College &
Research Scholar. Mother Teresa Women’s University
[3]. Assistant Professor, Department of Computer Science, Mother Teresa
Women’s University.
February 17, 2017
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
2/20
Contents:
Contents
1 Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
3/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Malware (Malicious Software)
Malware ANY program or file that is harmful to a computer
(mobile devices, etc.) user is called Malware or malicious
software. That includes viruses, worms, Trojan horses,
Spyware etc.
Ransomware!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
4/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Diagram:
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
5/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Statistics:Countries by Percentage
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
6/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Statistics: By types of Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
7/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Types of Ransomware:
1- Crypto-Ransomware: (Data Locker) Prevent access
to personal files, Encrypting Symmetric, Asymmetric
2- Locker-Ransomware: (Computer Locker) Denies
access to computer/mobile device/system.
Operating Systems:
Microsoft: Windows Client/Server Versions
Linux: Linux Client/Server Distributions/Versions
OS X: OS X Client/Server Versions
Android/iOS: for handhold devices (Phones, Tablets, TVs etc.)
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
8/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Targets of Ransomware
General/ Home Users
Businesses, Companies and Organizations
Public agencies and Government
Systems Affected by Ransomware :
Personal Computers
Mobile Devices
Servers
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
9/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
10/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
11/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Locker-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
12/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Google Drive
Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
13/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
How you get infected:
Propagation Ways:
Traffic Distribution System (TDS)
Malvertisement (Malware Advertisement)
Spam Email
Downloaders
Social Engineering and Self-propagation
Affiliate Scheme of Spreading
Other Ways you know...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
14/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Victim Manipulation Techniques:
Economics: Amount of money, type...
Psychology: Time limit, Demo of decrypting...
Social Engineering: Spreading Techniques, Spam...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
15/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Countermeasures and Prevention:
Educate Staff and Inform
Update the System and Patching Software
Use a layered defense approach
Endpoint Security solution
Advise for mobile/tablet device users
Use Network Protection
Make Backups and have a Disciplined Plan
Worst State: tools to remove, Shadow copies, No
Bulletproof solution
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
16/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Suggested Solution:
Use Automatic Snapshot (State Saver) Technology:
Hardware-Based and Software Based
Hardware-Based: for companies and enterprise
industries, Government etc.
Software-Based: for Home users and personal
Computers etc.
Demo!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
17/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Conclusion
Problem Statement:
Malwrare: Ransomware: Cryto,Locker
Operating Systems: Microsoft, Linux, OS X, Android...
Targets and Propagation
Home Users, Businesses, Public Agencies, Government etc.
System Affected: PCs, Mobile Devices, Servers
Countermeasures and Prevention Solution
Educate Staff, Update Systems, Layered/Endpoint Security,
Backups
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
18/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Further Research:
Malware Analysis and Reverse Engineering of
Ransomware in depth...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
19/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
References
Hunter Hoffmann, Karthikeyan Ramasamy. (October 26,
2016). Beazley project ransomware attack to quadruple in
2016.
McAfee Lab, (2009). Ransomware-Petya. McAfee Labs
Threat Advisory: April 11, 2016.
Kevin Savage, Peter Coogan and Hon Lau . (2015).The
Evolution of Ransomware. August 6, 2015
etc...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
20/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Thank You For Your
Attention
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

Contenu connexe

En vedette

Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação CyberpunkOrlando Simões
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasuressecurityxploded
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresAirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogenswarwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresAmerican Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingpolichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaCampus Party Brasil
 
Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)vjgarciaq
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programminghybr1s
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Marko Kovic
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasuresguestc27cd9
 

En vedette (18)

Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasures
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
 
Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programming
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasures
 

Similaire à Basic introduction and countermeasures to ransomware threats presentation

The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docxdrennanmicah
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilaslicservernoida
 
Running head STUDY OF RANSOMWARE .docx
Running head STUDY OF RANSOMWARE                                 .docxRunning head STUDY OF RANSOMWARE                                 .docx
Running head STUDY OF RANSOMWARE .docxjeanettehully
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetLumension
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksMark D. Webster, Ph.D.
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceNorman Johnson
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks revetonMumbere Joab
 

Similaire à Basic introduction and countermeasures to ransomware threats presentation (20)

The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Running head STUDY OF RANSOMWARE .docx
Running head STUDY OF RANSOMWARE                                 .docxRunning head STUDY OF RANSOMWARE                                 .docx
Running head STUDY OF RANSOMWARE .docx
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
C3
C3C3
C3
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 

Plus de Darwish Ahmad

Lecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer NetworksLecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer NetworksDarwish Ahmad
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityDarwish Ahmad
 
Countermeasures To Ransomware Threats
Countermeasures To Ransomware ThreatsCountermeasures To Ransomware Threats
Countermeasures To Ransomware ThreatsDarwish Ahmad
 
Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Darwish Ahmad
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing BasicsDarwish Ahmad
 
Designing Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDesigning Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDarwish Ahmad
 

Plus de Darwish Ahmad (6)

Lecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer NetworksLecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer Networks
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 
Countermeasures To Ransomware Threats
Countermeasures To Ransomware ThreatsCountermeasures To Ransomware Threats
Countermeasures To Ransomware Threats
 
Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
 
Designing Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDesigning Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : Documentation
 

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Basic introduction and countermeasures to ransomware threats presentation

  • 1. 1/20 Contents: Basic Introduction and Countermeasures to Ransomware Threats Darwish Ahmad Herati1 , A.M.Bojamma2 , Dr.M.P. Indira Gandhi3 [1]. Department of Computer Science, St. Joseph’s College Bangalore [2]. Assistant Professor, Department of Computer Science, St. Joseph’s College & Research Scholar. Mother Teresa Women’s University [3]. Assistant Professor, Department of Computer Science, Mother Teresa Women’s University. February 17, 2017 St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 2. 2/20 Contents: Contents 1 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 3. 3/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Malware (Malicious Software) Malware ANY program or file that is harmful to a computer (mobile devices, etc.) user is called Malware or malicious software. That includes viruses, worms, Trojan horses, Spyware etc. Ransomware!!! St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 4. 4/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Diagram: St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 5. 5/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Statistics:Countries by Percentage St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 6. 6/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Statistics: By types of Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 7. 7/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Types of Ransomware: 1- Crypto-Ransomware: (Data Locker) Prevent access to personal files, Encrypting Symmetric, Asymmetric 2- Locker-Ransomware: (Computer Locker) Denies access to computer/mobile device/system. Operating Systems: Microsoft: Windows Client/Server Versions Linux: Linux Client/Server Distributions/Versions OS X: OS X Client/Server Versions Android/iOS: for handhold devices (Phones, Tablets, TVs etc.) St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 8. 8/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Targets of Ransomware General/ Home Users Businesses, Companies and Organizations Public agencies and Government Systems Affected by Ransomware : Personal Computers Mobile Devices Servers St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 9. 9/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Crypto-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 10. 10/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Crypto-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 11. 11/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Locker-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 12. 12/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Google Drive Crypto-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 13. 13/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References How you get infected: Propagation Ways: Traffic Distribution System (TDS) Malvertisement (Malware Advertisement) Spam Email Downloaders Social Engineering and Self-propagation Affiliate Scheme of Spreading Other Ways you know... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 14. 14/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Victim Manipulation Techniques: Economics: Amount of money, type... Psychology: Time limit, Demo of decrypting... Social Engineering: Spreading Techniques, Spam... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 15. 15/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Countermeasures and Prevention: Educate Staff and Inform Update the System and Patching Software Use a layered defense approach Endpoint Security solution Advise for mobile/tablet device users Use Network Protection Make Backups and have a Disciplined Plan Worst State: tools to remove, Shadow copies, No Bulletproof solution St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 16. 16/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Suggested Solution: Use Automatic Snapshot (State Saver) Technology: Hardware-Based and Software Based Hardware-Based: for companies and enterprise industries, Government etc. Software-Based: for Home users and personal Computers etc. Demo!!! St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 17. 17/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Conclusion Problem Statement: Malwrare: Ransomware: Cryto,Locker Operating Systems: Microsoft, Linux, OS X, Android... Targets and Propagation Home Users, Businesses, Public Agencies, Government etc. System Affected: PCs, Mobile Devices, Servers Countermeasures and Prevention Solution Educate Staff, Update Systems, Layered/Endpoint Security, Backups St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 18. 18/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Further Research: Malware Analysis and Reverse Engineering of Ransomware in depth... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 19. 19/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References References Hunter Hoffmann, Karthikeyan Ramasamy. (October 26, 2016). Beazley project ransomware attack to quadruple in 2016. McAfee Lab, (2009). Ransomware-Petya. McAfee Labs Threat Advisory: April 11, 2016. Kevin Savage, Peter Coogan and Hon Lau . (2015).The Evolution of Ransomware. August 6, 2015 etc... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 20. 20/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Thank You For Your Attention St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats