Nobody downloaded yet

Ransomware - Research Paper Example

Comments (0) Cite this document
Summary
The recent cyber threat in a computer system is ransomware also known as cryptovirus. Ransomware is a virtual extortion that uses data…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Ransomware
Read TextPreview

Extract of sample "Ransomware"

Download file to see previous pages Ransomware is a threat due to inability to recover information from the infected computer.
Ransomware is a hijacking threat in the computer system using encryption technology to limit or prevent the user’s access to their system. The Three types of ransomware include encrypting malware, lock-screen viruses and scareware. The ransomware make be in the form of police blocking computer access or FBI virus while others use pornographic images to embarrass the victim. The victims of this malware are usually internet users though hijacking of their user files. It often requires the user to pay ransom to the malware creator before removing the restriction. The attacker may seize the files or computer until the user pays the ransom to online currency accounts such as Webmoney or eGold. The attacks using ransomware are becoming more sophisticated and refined in algorithm posing great challenges to data protection.
We will consider the history of ransomware, how ransomware functions in this article. Besides, the paper discusses the reason behind its fast growth, how to prevent it or fix the computer after infection. The increase in the use of ransomware since the formation of the first one raises the question of why they are becoming more prominent. The ransomware is likely to evolve further with the current ones having the ability to encrypt and lock the files. The latest actions of the ransomware ensure the damage they cause continues even after removal without paying the ransom money.
As the technology evolves, the malware also evolves in many ways to thrive (Elisan & Hypponen, 2013). . Ransomware has changed over time since the first case in the infection methods, directives and persistence. The early cases of ransomware were benign and easy to remove. However, the new strains are more persistent and pose great threats. The first ransomware is PC Cyborg in 1989 that claimed expiry of license to a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ransomware Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1699641-ransomware
(Ransomware Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1699641-ransomware.
“Ransomware Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1699641-ransomware.
  • Cited: 1 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ransomware

An Assessment of the Vulnerabilities of the iPhone

... automated tasks over the internet, without you knowing it” (What is a Botnet? 2011). These Bot can infect a large number of computers which are further called as botnet. Criminals can use these Botnets for sending spam massages, spreading viruses and commit other fraudulent activities like computer hack, thereby helping them. Dropper programs are those malicious programs used to aid other malwares. They are initially undamaging programs but they can channel other malware into the computer. They take their orders from their owners, in setting the malware into the computer. “Ransomware is a type of malicious computer software that threatens the user to take some destructive or harmful actions” (Ransomware: What is Ransomware 2001... ). These...
20 Pages(5000 words)Dissertation

Ransomware

...? Ransomware Ransomware Introduction The term Ransomware is used to refer to a ification of malware which limits the usage of a user’s computer system by attacking it and coerces the user to pay certain amount of ransom to the developer of that particular malware if the user wants the malware to be removed and wants to reuse his system (Viega, 2009, p.22). Certain types of ransomware apply a password lock to the files of the victim’s computer system while certain of them completely lock the entire system and coerce the user into paying ransom. These attacks were first practiced in the region of Russia, but in later years these attacks were spread throughout the globe,...
3 Pages(750 words)Research Paper

Malware and computer system

.... The history of these computer malware date back to as early as 1986 when the first computer malware was made for PC by the two Pakistani brothers. Since then there has been so many advances as far as the malware are concerned from the then window malware which had the mail worms and the macro worms. Later there was the network warms that came through the internet then finally new malware like the rootkit and ransomware were to be found in the computer systems in the later years. Today malware include the computer viruses, ransomware, worms, rootkit, keyloggers, dialers, spyware, adware, malicious BHOs and Trojan horses (Skoudis & Zeltser, 2004). Body of the Report During the last twenty four hours our...
6 Pages(1500 words)Essay

Cyber Crime: Edward Snowdens leaks

...) The availability of malware kits. The underground market has provided a large amount of windows-based malware to cybercriminals. Their easy availability places windows users at a risk since they make it easy for criminals with basic knowledge about operating systems to access information stored on computers through public networks and by hacking into the computers. c) Ransomware. This system of malware does not depend on the use of infected systems by the victim to conduct financial transactions in order to prey on them. These criminals hijack the victim’s ability to access data or communicate and they prevent the victim from accessing the system completely. Thus the victim is forced to pay a ransom in order to regain...
4 Pages(1000 words)Essay

THE LARGE HADRON COLLIDER

1 Pages(250 words)Essay

CIS assigntment #2

...meant for the computer owner only. Examples of information stealers include desktop recorders, memory scrapers and keyloggers. Ransomware – This can be considered to be one of the most destructive malware available as they are designed to hold the computer owner hostage by taking control of their PC and threatening to delete important files or even the whole machine unless financial compensation is paid to the creator in exchange for having the “problem solved” (Brodkin, 2013). Botnets – This malware does not exactly directly affect the computer and turns a user’s desktop into their own task dog and a hacker is able to use to perform various functions that may bring about monetary gain (Brodkin, 2013). The main...
2 Pages(500 words)Essay

Microsoft BSA

...irritates by displaying diverse pop-ups, as the malicious pop-up program runs secretly in the downloaded product (SpamLaws, n.d). Question # 3 – Part b There are many types of Malware that include but not limited to the Adware, Bot, Bug, Ransomware, Rootkit, Spyware, Trojan Horse, Virus and Worm (Lord, 2011). There are several software applications that could be utilized in the computers to prevent the Malware including anti-virus and anti-adware. Question # 4 – Part a The Conficker is a computer worm that has ability to infect a computer and widen itself automatically (without human interaction) to the other computer over the computer network. The Conficker worm attacks the computer network services through the...
2 Pages(500 words)Assignment

Computer Ethics

...Computer Ethics Computer Ethics Computer Ethics Issues Two computer ethics issues related with the use of ransomware includes the issue of privacy and criminal behavior. Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she has the authority to do so. When individuals gain access to unauthorized information, they use it in different ways for their own self interest while ignoring the interest of the society. The utilitarian rule of ethics state that if an activity results in damaging the society and benefiting a few, then that particular activity is regarded as unethical. On the other hand, if a computer professional...
2 Pages(500 words)Case Study

CryptoLocker

...CryptoLocker, in technical terms, can be described as a form of malware which uses the conceptions of encryption and decryption for harassing the victims. The common methods for this malware transmission include emails, botnets and concealed transmission within network data. In terms of severity, cryptolocker malware can be ranked within one of the most deadly malwares and tacking the same might turn out to be highly tedious. One of the prime threats, which might arise from CryptoLocker, is disrupting the operational systems, resulting in losing valuable or confidential data (Oregon, “Computer Help Documents”). The designing pattern of CryptoLocker malware generally projects it to be a type of ransomware code, which...
2 Pages(500 words)Admission/Application Essay

The importance of Ethics to Sustainable Growth in Engineering Enterprise

...Security Threats and Risk of Ransomware Attacks al Affiliation Table of Contents Table of Contents 2 INTRODUCTION 3 Background 3Justification 4 Aims and Objectives 5 LITERATURE REVIEW 6 RESEARCH METHODOLOGY 9 Research Philosophy 9 Research Approach 10 Qualitative Research 10 Structured Interviews 12 Rationale for structured interview 13 CONCLUSION 13 Reference List 14 Appendix 17 INTRODUCTION Background Information technology has developed to become an important aspect in the society today. Individuals and organizations use IT resources for various purposes including communication, exchange of ideas, storage of data and for transactions. For businesses, IT has become an important transactional tool and an avenue for streamlining... be put in...
5 Pages(1250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Ransomware for FREE!

Contact Us