Working mechanism of ransomware

Assignment Help Computer Networking
Reference no: EM132094085

Potential threats and mitigation tools for ransomware

Purpose of the assessment (with ULO Mapping) Students should be able to demonstrate their achievements in the following unit learning outcomes:

b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

Assignment Description

The security remains a challenge in networked information systems. One of the fastest evolving malware is ransomware. The ransomware embeds itself onto the computer in such a manner that it cannot be segregated, and even rebooting causes the ransomware to launch malicious code again. A ransomware continues to be a serious threat to the network users.

Assume you have an interview for the ransomware analyst position with Regal Security Solutions company. You are supposed to be prepared about the ransomware, their types, threats, and mitigation tools. In this context write a report including the following sections:

A. Introduction about ransomware and their impacts on the society

B. Discussion of any five variants of ransomware (Consider some recently developed ransomware)

C. The working mechanism of ransomware

D. Potential threats posed by ransomware

E. Case study of at least one recent attack carried out by the ransomware

F. Recommendations on any two mitigation tools to tackle the ransomware attack and discuss the effectiveness of the selected tools

G. Summary

H. References in IEEE Transactions on Networking style

Verified Expert

The work is in 1800 words where the focus is on how ransomware works on handling the taxonomy of the attach. It includes the attacks, and the mitigation tools which are important. The work is in IEEE format where the results are in MS word. Hence, the discussion for a recent attack using Ransomware is also done here.

Reference no: EM132094085

Questions Cloud

Driving factor in improving patient care : Investment in IT is considered a driving factor in improving patient care; the critical question asked by CEOs, CFOs
Describe object oriented programming in your own words : Describe objects in your own words. What are objects? Give examples of different types of objects as described in class. How are objects created, etc?
Sections of a strategic marketing plan : This week you will be completing the first two sections of a Strategic Marketing Plan. This plan is to be based on your New Shoes Simulation company.
Determine the eigenvalues and eigenvectors for the following : Use MATLAB to determine the eigenvalues and eigenvectors for the following 4x4 matrix (Note: the semicolon indicates the end of a row).
Working mechanism of ransomware : Potential threats and mitigation tools for ransomware - Overview of Network Security - Analyse and discuss common emerging threats, attacks, mitigation
Cost benefit analysis template : Apply a cost-benefit analysis to consider potential profit and risks to your organization based on the experience of Banner Health System.
Perform an amortized analysis of the running time of n : Suppose that after every K operations, we automatically make a copy of the stack for back-up purposes. (Note the stack may or may not be full at this point.)
Immigration platforms of two organizations : Research and compare the immigration platforms of two organizations: one American political party
Define a function that returns a stream of random numbers : Define a function that returns a stream of random numbers that uses this linear-congruential formula.

Reviews

inf2094085

10/23/2018 8:25:07 PM

the complete solution was exact and grammar wise correct. although thanks to experts mind for delivering the solution on time... Thanks for your help... will surely come back with a bag full of my assignments.

len2094085

8/23/2018 4:58:43 AM

Recent Attack /5 A detailed and very clear case study about the recent attack from period also clearly citing the source Very clear case study about the recent attack from period Generally good case study about the recent attack from period Brief discussion about the recent attack. A discussion about very old ransomware attack with irrelevant information Mitigation Tools /15 An in-depth and very clear discussion about Mitigation tools and their effectiveness Very clear discussion about Mitigation tools and their effectiveness Generally good discussion about Mitigation tools Brief discussion about Mitigation tools Irrelevant discussion about the mitigation tools

len2094085

8/23/2018 4:58:32 AM

Variants of Ransomware /10 In-depth and very clear discussion about five variants of recent ransomware Very clear discussion about five variants of recent ransomware Generally good discussion about five variants ransomware Brief discussion about some variants of ransomware Poor discussion with irrelevant information Working Mechanism /5 A very detailed and very clear working mechanism of ransomware Very clear working mechanism of ransomware Generally good discussion about working mechanism of ransomware Brief discussion about working mechanism of ransomware Poor discussion with irrelevant information Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail <50% Potential Threats /10 A very clear and in-depth discussion about potential threats Very clear discussion about potential threats Generally good discussion about potential threats Brief discussion about the potential threats Poor discussion about potential threats with irrelevant information

len2094085

8/23/2018 4:58:24 AM

Example Marking Rubric for Assignment #: Total Marks 60 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction is very well Introduction is written with generally Introduction is very clear Introduction is presented in presented briefly background, well written with good fashion, with some Introduction /5 discussion about the impact of clear discussion about the impact of ransomware on however missing one element such as the relevance and missing elements such as the impact Poor Introduction with irrelevant details ransomware the society, and impact of of ransomware on on the society, the report outline ransomware on the society/ the and the report the society/ the report outline outline report outline

len2094085

8/23/2018 4:57:59 AM

Working Mechanism The working mechanism of ransomware • Discuss the working mechanism of ransomware with proper citation 05 Potential Threats Potential threats posed by ransomware • System lockup • Encrypting and deleting the files 10 Recent Attack Case study of one recent attack carried out by the ransomware during period. 05 Mitigation Tools Recommend any two mitigation tools to tackle the ransomware attacks and discuss the effectiveness of these tools • Discuss any two mitigation tools • Discuss the effeteness of selected mitigation tools in terms of response time and resolution time 15 Summary Summary • Summarise the overall contributions of the report 05 References References • Must consider at least five current references from journal/conference papers and books. • Must follow IEEE Transactions on Networking style 05 Total Marks 60

len2094085

8/23/2018 4:57:52 AM

Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about ransomware and their impacts on the society • Introduction about ransomware • The impact of ransomware on the society • The report outline 05 Variants of Ransomware Discuss any five variants of ransomware (Consider some recently developed ransomware) • Draw taxonomy • Discuss the selected ransomware 10

len2094085

8/23/2018 4:57:43 AM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd