StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Ransomware - Research Paper Example

Cite this document
Summary
Certain types of ransomware apply a password lock to the files of the victim’s computer system while certain of them completely lock the entire system and coerce the user into paying ransom. These attacks were first practiced in the region of Russia, but in later years these attacks were spread throughout the globe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Ransomware
Read Text Preview

Extract of sample "Ransomware"

Download file to see previous pages

The way the ransomware attacks a computer system is similar to the way a computer worm operates. This means that a ransomware uses the route of downloaded data and it may even enter a computer system through a network that is vulnerable against such attacks and is not properly secured. Ransomware developers use payload to password protect personal files of a user, encrypt data that is textual in nature or minimize the users communication with his/her personal computer by displaying notices that the system has been used for illegal purposes, it even overrides files in the windows registry area such as the file of explorer.

exe or restrict the user from being able to use the system until the user has not repaired the entire system. The system of coercing the computer user through display of messages is regarded as scareware. The first ever created ransomware was created by Joseph Popp who named his ransomware as PC Cyborg Trojan (Emm, 2008, p.15). In this ransomware the developer had developed a payload that used to state that the license of a particular software has been expired and the ransomware even used to password protect the softwares on the hardrive and use to coerce the user into paying an amount of $189 to the developer if the user wanted to reuse the software or unlock the encrypted system.

Josephy was caught by the criminal justice system and he was recognized as mentally unfit, Josephy gave his earned money to help in funding AIDS related research. During the season of 2010, ten people were arrested by the local authorities of Russia for developing a ransomware named as WinLock (Celtnet, 2012). This ransomware was indulged in the act of displaying images that were pornographic in nature and used to coerce the users into sending a premium rate text message which was priced at $10 in order if the users wanted to unlock their computer systems through a code.

The developers of this ransomware earned more than $16 million; this ransomware did not use the technique of encrypting files and computer systems. During the year of 2012 a huge ransomware named as Reveton which was even recognized with the nick name of Police Trojan started spreading in US. This ransomware displayed a message on the user’s pc stating that the law enforcement organizations have detected illegal activities conducted on the computer system. For example: viewing and downloading of softwares that are pirated in nature and downloading of pornographic material.

The playload used by this ransomware required users to reimburse the authorities by utilizing a voucher from an unknown cash service that was prepaid in nature. To increase the fear of the law enforcement agency, the developers used to display the IP address used by the user and the ransomware even showed the users that the intelligence agencies are recording their activities. During the month of August 2012, the developers of Reveton attacked US computer system and the message displayed by the playload stated that the user has to compensate for their illegal activities by paying a total of $200 to the FBI through MoneyPack card (PERLROTH, 2012).

Defense Several methods have been identified by security software developers and other software develope

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ransomware Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1464745-ransomware
(Ransomware Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1464745-ransomware.
“Ransomware Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1464745-ransomware.
  • Cited: 5 times

CHECK THESE SAMPLES OF Ransomware

The Microsoft Baseline Security Analyzer

Question # 3 – Part b There are many types of Malware that include but not limited to the Adware, Bot, Bug, Ransomware, Rootkit, Spyware, Trojan Horse, Virus and Worm (Lord, 2011).... The MBSA checks the passwords keeping in view the characteristics of the weak passwords include: the blank passwords, simple or easy to crack… One of the main reasons for emphasizing the strong passwords is that despite the development and implementation of latest technologies to protect secured information, the information can easily have Question # 2 – Part a The Microsoft Baseline Security Analyzer (MBSA) tool provides multiple scan facilities to assess the weak local account passwords....
2 Pages (500 words) Assignment

How Malware Infects a Computer

Some of the most common malware include computer viruses, spyware, Ransomware, scareware, and adware.... Some of the most common malware include computer viruses, spyware, Ransomware, scareware and adware.... The author of the present essay "How Malware Infects a Computer" points out that Malware refers to malicious software that is used to disrupt the normal functioning and operations of a computer....
1 Pages (250 words) Essay

Computer Ethics

The utilitarian rule of ethics state that if an activity results in damaging the society and Computer Ethics Computer Ethics Computer Ethics Issues Two computer ethics issues related with the use of Ransomware includes the issue of privacy and criminal behavior.... revention From Ransomware One way through which computer users can protect their computers from being attacked by Ransomware is by protecting their computers with security software....
2 Pages (500 words) Case Study

The importance of Ethics to Sustainable Growth in Engineering Enterprise

Ransomware has emerged to be a source of threat both to individuals and organizations.... Teer, Kruck & Kruck (2007) notes that Ransomware perpetrators are able to victimize the internet users and organizations by hijacking the files stored, encrypting them before demanding payment in exchange for the decryption key....
5 Pages (1250 words) Essay

Preventing and Removal of Ransomware

The paper "Preventing and Removal of Ransomware" asserts that Any user should back up their files as a precaution not to lose the important files in case of any attacks.... The recent cyber threat in a computer system is Ransomware also known as cryptovirus.... Ransomware is virtual extortion that uses data encryption, Trojan destruction threat, and lockout of the user.... Ransomware is a threat due to the inability to recover information from the infected computer....
6 Pages (1500 words) Essay

Third Edition of the Hackers Playbook by Peter Kim

The core is to ensure that worms that come back into vogue with the malware and Ransomware cannot easily propagate across the networks.... The author of the paper "Third Edition of the Hackers Playbook by Peter Kim" will begin with the statement that the third Edition of the Hacker's Playbook Findings report is a new edition analogous to previous reports that gave organizations trends from the attacker's point of view....
2 Pages (500 words) Assignment

Cyber Security, Network and Computer Systems Administrators, and Computer Programmer

The dramatic growth in cyber-attacks such as Ransomware, worms, Tranjon horse, viruses, zombies, and adware threats have taken a great toll among various business enterprises leading to a greater demand in the cybersecurity profession.... "Cyber Security, Network and Computer Systems Administrators, and Computer Programmer" paper contain an annotated bibliography that reviews five sources for the following three occupations: Cyber Security, Network and Computer Systems Administrators, and Computer Programmer....
3 Pages (750 words) Annotated Bibliography

Health Insurance Portability and Accountability Act Compliance in Medical Information Security

With the rising cases of medical records security breaches, the prevalence of Ransomware attacks, effectively securing our medical data has become a matter of great concern.... With the rising cases of medical records security breaches, the prevalence of Ransomware attacks, effectively securing our medical data has become a matter of great concern, not only to Mercy Vale facility but also to every other medical institution and the regulatory body or agencies....
3 Pages (750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us