Working mechanism of ransomware

Assignment Help Computer Networking
Reference no: EM132094085

Potential threats and mitigation tools for ransomware

Purpose of the assessment (with ULO Mapping) Students should be able to demonstrate their achievements in the following unit learning outcomes:

b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems

Assignment Description

The security remains a challenge in networked information systems. One of the fastest evolving malware is ransomware. The ransomware embeds itself onto the computer in such a manner that it cannot be segregated, and even rebooting causes the ransomware to launch malicious code again. A ransomware continues to be a serious threat to the network users.

Assume you have an interview for the ransomware analyst position with Regal Security Solutions company. You are supposed to be prepared about the ransomware, their types, threats, and mitigation tools. In this context write a report including the following sections:

A. Introduction about ransomware and their impacts on the society

B. Discussion of any five variants of ransomware (Consider some recently developed ransomware)

C. The working mechanism of ransomware

D. Potential threats posed by ransomware

E. Case study of at least one recent attack carried out by the ransomware

F. Recommendations on any two mitigation tools to tackle the ransomware attack and discuss the effectiveness of the selected tools

G. Summary

H. References in IEEE Transactions on Networking style

Verified Expert

The work is in 1800 words where the focus is on how ransomware works on handling the taxonomy of the attach. It includes the attacks, and the mitigation tools which are important. The work is in IEEE format where the results are in MS word. Hence, the discussion for a recent attack using Ransomware is also done here.

Reference no: EM132094085

Questions Cloud

Driving factor in improving patient care : Investment in IT is considered a driving factor in improving patient care; the critical question asked by CEOs, CFOs
Describe object oriented programming in your own words : Describe objects in your own words. What are objects? Give examples of different types of objects as described in class. How are objects created, etc?
Sections of a strategic marketing plan : This week you will be completing the first two sections of a Strategic Marketing Plan. This plan is to be based on your New Shoes Simulation company.
Determine the eigenvalues and eigenvectors for the following : Use MATLAB to determine the eigenvalues and eigenvectors for the following 4x4 matrix (Note: the semicolon indicates the end of a row).
Working mechanism of ransomware : Potential threats and mitigation tools for ransomware - Overview of Network Security - Analyse and discuss common emerging threats, attacks, mitigation
Cost benefit analysis template : Apply a cost-benefit analysis to consider potential profit and risks to your organization based on the experience of Banner Health System.
Perform an amortized analysis of the running time of n : Suppose that after every K operations, we automatically make a copy of the stack for back-up purposes. (Note the stack may or may not be full at this point.)
Immigration platforms of two organizations : Research and compare the immigration platforms of two organizations: one American political party
Define a function that returns a stream of random numbers : Define a function that returns a stream of random numbers that uses this linear-congruential formula.

Reviews

inf2094085

10/23/2018 8:25:07 PM

the complete solution was exact and grammar wise correct. although thanks to experts mind for delivering the solution on time... Thanks for your help... will surely come back with a bag full of my assignments.

len2094085

8/23/2018 4:58:43 AM

Recent Attack /5 A detailed and very clear case study about the recent attack from period also clearly citing the source Very clear case study about the recent attack from period Generally good case study about the recent attack from period Brief discussion about the recent attack. A discussion about very old ransomware attack with irrelevant information Mitigation Tools /15 An in-depth and very clear discussion about Mitigation tools and their effectiveness Very clear discussion about Mitigation tools and their effectiveness Generally good discussion about Mitigation tools Brief discussion about Mitigation tools Irrelevant discussion about the mitigation tools

len2094085

8/23/2018 4:58:32 AM

Variants of Ransomware /10 In-depth and very clear discussion about five variants of recent ransomware Very clear discussion about five variants of recent ransomware Generally good discussion about five variants ransomware Brief discussion about some variants of ransomware Poor discussion with irrelevant information Working Mechanism /5 A very detailed and very clear working mechanism of ransomware Very clear working mechanism of ransomware Generally good discussion about working mechanism of ransomware Brief discussion about working mechanism of ransomware Poor discussion with irrelevant information Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail <50% Potential Threats /10 A very clear and in-depth discussion about potential threats Very clear discussion about potential threats Generally good discussion about potential threats Brief discussion about the potential threats Poor discussion about potential threats with irrelevant information

len2094085

8/23/2018 4:58:24 AM

Example Marking Rubric for Assignment #: Total Marks 60 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction is very well Introduction is written with generally Introduction is very clear Introduction is presented in presented briefly background, well written with good fashion, with some Introduction /5 discussion about the impact of clear discussion about the impact of ransomware on however missing one element such as the relevance and missing elements such as the impact Poor Introduction with irrelevant details ransomware the society, and impact of of ransomware on on the society, the report outline ransomware on the society/ the and the report the society/ the report outline outline report outline

len2094085

8/23/2018 4:57:59 AM

Working Mechanism The working mechanism of ransomware • Discuss the working mechanism of ransomware with proper citation 05 Potential Threats Potential threats posed by ransomware • System lockup • Encrypting and deleting the files 10 Recent Attack Case study of one recent attack carried out by the ransomware during period. 05 Mitigation Tools Recommend any two mitigation tools to tackle the ransomware attacks and discuss the effectiveness of these tools • Discuss any two mitigation tools • Discuss the effeteness of selected mitigation tools in terms of response time and resolution time 15 Summary Summary • Summarise the overall contributions of the report 05 References References • Must consider at least five current references from journal/conference papers and books. • Must follow IEEE Transactions on Networking style 05 Total Marks 60

len2094085

8/23/2018 4:57:52 AM

Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about ransomware and their impacts on the society • Introduction about ransomware • The impact of ransomware on the society • The report outline 05 Variants of Ransomware Discuss any five variants of ransomware (Consider some recently developed ransomware) • Draw taxonomy • Discuss the selected ransomware 10

len2094085

8/23/2018 4:57:43 AM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Implementing sliding window protocols using cnet

Implementing Sliding Window Protocols using CNET - It is assumed that the nodes will communicate directly with each other if they are directly connected, otherwise the intermediate nodes will be used to relay the communications. No dynamic routing ..

  Complete ipv4 overview sections of routing and switching pro

Complete the following sections of "Routing and Switching Pro" in. TestOut LabSim: Section 5.1: IPv4 Overview. Section 5.2: IPv4 Address Classes. Section 8.1: IPv6 Addressing Overviewections of "Routing and Switching Pro" in.

  Which modes of network connectivity would meet company needs

Determine which modes of network connectivity would best meet the company's needs. Consider LAN, WAN, and wireless requirements.

  Where are wlan technologies going in the future

Where are WLAN technologies going in the future? Research what the next versions of the 802.11 standards are, and provide your educated opinion on how these technologies will be used.

  What type of wiring would you suggest

A retail department store is approximately square, 35 meters (100 feet) on each side. What type of wiring would you suggest?

  List the main applications of function points

Explain very briefly (five lines at most) the idea behind Albrechts function points measure. List the main applications of function points.

  Home networking solutions

Question:  The Thomsons all have their own separate computers at home. The problem is, there is only one printer, and it is attached to Bob's computer.

  Routing and switching selection criteria

Routing and Switching Selection Criteria.

  Describe domain name system

Describe Domain Name System. Describe Hierarchical Namespace. Define Fully Qualified Domain Name and Partially Qualified Domain Name. What is transmission impairment?

  About business plan - The Voice over IP Project must meet

As the school wishes to install handsets in each classroom, the current PBX does not have the handset capacity. This combined with the age of the current PBX, it has approved the finance and installation of a VoIP solution to be rolled out through..

  Describe the open systems interconnection protocol model

Describe the Open Systems Interconnection (OSI) protocol model and Identify major protocols for circuit switching and packet switching

  Requires interface and the provides interface in your design

nclude both the Requires interface and the Provides interface in your design. Develop a visual rendering depicting your design through the use of Microsoft Visio or its open source alternative, Dia

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd