SlideShare a Scribd company logo
1 of 1
Download to read offline
In a digital age where computers are connected via network and data are stored on the
cloud, this present challenges and risks. In May 2017, a widespread ransomware
campaign is impacting global corporations, government entities and home users in
multiple countries. The latest version of this ransomware variantknown as WannaCryor
Wanna Decryptor- has spread rapidly over the weekend. Ransomware is a program that
covertly installs on devices and either mounts an extortion attack that holds data
hostage or locks operating systems until a ransom is paid.
Research and discuss strategies to counteract such a threat at the personal, corporate,
and national levels.
word count (500 words)
In a digital age where computers are connected via network and data are stored on the cloud, this
present challenges and risks. In May 2017, a widespread ransomware campaign is impacting
global corporations, government entities and home users in multiple countries. The latest version
of this ransomware variantknown as WannaCryor Wanna Decryptor- has spread rapidly over the
weekend. Ransomware is a program that covertly installs on devices and either mounts an
extortion attack that holds data hostage or locks operating systems until a ransom is paid.
Research and discuss strategies to counteract such a threat at the personal, corporate, and
national levels.
In a digital age where computers are connected via network and data are stored on the cloud, this
present challenges and risks. In May 2017, a widespread ransomware campaign is impacting
global corporations, government entities and home users in multiple countries. The latest version
of this ransomware variantknown as WannaCryor Wanna Decryptor- has spread rapidly over the
weekend. Ransomware is a program that covertly installs on devices and either mounts an
extortion attack that holds data hostage or locks operating systems until a ransom is paid.
Research and discuss strategies to counteract such a threat at the personal, corporate, and
national levels.
word count (500 words)

More Related Content

Similar to In a digital age where computers are connected via network and data ar.pdf

Similar to In a digital age where computers are connected via network and data ar.pdf (20)

Defending Against Ransomware.pdf
Defending Against Ransomware.pdfDefending Against Ransomware.pdf
Defending Against Ransomware.pdf
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Ransomware
RansomwareRansomware
Ransomware
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomware
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Nominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security ReportNominum 2016 Fall Data Revelations Security Report
Nominum 2016 Fall Data Revelations Security Report
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Countermeasures To Ransomware Threats
Countermeasures To Ransomware ThreatsCountermeasures To Ransomware Threats
Countermeasures To Ransomware Threats
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 

More from asarudheen07

More from asarudheen07 (20)

In a study of the incidence of Ebola virus- 1000 subjects were followe.pdf
In a study of the incidence of Ebola virus- 1000 subjects were followe.pdfIn a study of the incidence of Ebola virus- 1000 subjects were followe.pdf
In a study of the incidence of Ebola virus- 1000 subjects were followe.pdf
 
In a society of population N- the probability is p that a person has a.pdf
In a society of population N- the probability is p that a person has a.pdfIn a society of population N- the probability is p that a person has a.pdf
In a society of population N- the probability is p that a person has a.pdf
 
In a eukaryotic cell- mature mRNA contains Multiple Choice a poly A ta.pdf
In a eukaryotic cell- mature mRNA contains Multiple Choice a poly A ta.pdfIn a eukaryotic cell- mature mRNA contains Multiple Choice a poly A ta.pdf
In a eukaryotic cell- mature mRNA contains Multiple Choice a poly A ta.pdf
 
In a population where the effective population size (Ne) is 50 - allel.pdf
In a population where the effective population size (Ne) is 50 - allel.pdfIn a population where the effective population size (Ne) is 50 - allel.pdf
In a population where the effective population size (Ne) is 50 - allel.pdf
 
In a prokaryotic cell- how would the mRNA be different from a tRNA- 1-.pdf
In a prokaryotic cell- how would the mRNA be different from a tRNA- 1-.pdfIn a prokaryotic cell- how would the mRNA be different from a tRNA- 1-.pdf
In a prokaryotic cell- how would the mRNA be different from a tRNA- 1-.pdf
 
In a diploid plant species- gene R (with alleles R and r ) and gene F.pdf
In a diploid plant species- gene R (with alleles R and r ) and gene F.pdfIn a diploid plant species- gene R (with alleles R and r ) and gene F.pdf
In a diploid plant species- gene R (with alleles R and r ) and gene F.pdf
 
In a new TCP connection that uses Selective Acknowledgment- If -0-125-.pdf
In a new TCP connection that uses Selective Acknowledgment- If -0-125-.pdfIn a new TCP connection that uses Selective Acknowledgment- If -0-125-.pdf
In a new TCP connection that uses Selective Acknowledgment- If -0-125-.pdf
 
In a paternity case- a mother- Jenny- claimed that the father of her c.pdf
In a paternity case- a mother- Jenny- claimed that the father of her c.pdfIn a paternity case- a mother- Jenny- claimed that the father of her c.pdf
In a paternity case- a mother- Jenny- claimed that the father of her c.pdf
 
In 2011 the Ministry of the environment reduced the acceptble concentr.pdf
In 2011 the Ministry of the environment reduced the acceptble concentr.pdfIn 2011 the Ministry of the environment reduced the acceptble concentr.pdf
In 2011 the Ministry of the environment reduced the acceptble concentr.pdf
 
In a follow up study- you decide to test whether the prevalence of WNV.pdf
In a follow up study- you decide to test whether the prevalence of WNV.pdfIn a follow up study- you decide to test whether the prevalence of WNV.pdf
In a follow up study- you decide to test whether the prevalence of WNV.pdf
 
In a certain city- the daly consumplion of water (in milions or bters).pdf
In a certain city- the daly consumplion of water (in milions or bters).pdfIn a certain city- the daly consumplion of water (in milions or bters).pdf
In a certain city- the daly consumplion of water (in milions or bters).pdf
 
In a city- 70- of the people prefer Candidate A- Suppose 30 people fro.pdf
In a city- 70- of the people prefer Candidate A- Suppose 30 people fro.pdfIn a city- 70- of the people prefer Candidate A- Suppose 30 people fro.pdf
In a city- 70- of the people prefer Candidate A- Suppose 30 people fro.pdf
 
In a 1-1-5 page document (APA format- 12-point font- double-spaced) an.pdf
In a 1-1-5 page document (APA format- 12-point font- double-spaced) an.pdfIn a 1-1-5 page document (APA format- 12-point font- double-spaced) an.pdf
In a 1-1-5 page document (APA format- 12-point font- double-spaced) an.pdf
 
In a 12-year grassland biodiversity experiment- 168 plots containing 1.pdf
In a 12-year grassland biodiversity experiment- 168 plots containing 1.pdfIn a 12-year grassland biodiversity experiment- 168 plots containing 1.pdf
In a 12-year grassland biodiversity experiment- 168 plots containing 1.pdf
 
In 2022- Lisa and Fred- a married couple- had taxable income of $311-4 (1).pdf
In 2022- Lisa and Fred- a married couple- had taxable income of $311-4 (1).pdfIn 2022- Lisa and Fred- a married couple- had taxable income of $311-4 (1).pdf
In 2022- Lisa and Fred- a married couple- had taxable income of $311-4 (1).pdf
 
In 2022- Juanita is married and files a joint tax return with her husb.pdf
In 2022- Juanita is married and files a joint tax return with her husb.pdfIn 2022- Juanita is married and files a joint tax return with her husb.pdf
In 2022- Juanita is married and files a joint tax return with her husb.pdf
 
In 2021- El Salvador became the first in the world to adopt bitcoin as.pdf
In 2021- El Salvador became the first in the world to adopt bitcoin as.pdfIn 2021- El Salvador became the first in the world to adopt bitcoin as.pdf
In 2021- El Salvador became the first in the world to adopt bitcoin as.pdf
 
In 2018- which of the following is true about medical schools in the U.pdf
In 2018- which of the following is true about medical schools in the U.pdfIn 2018- which of the following is true about medical schools in the U.pdf
In 2018- which of the following is true about medical schools in the U.pdf
 
In 2013- the housing market started picking up- Were people getting th.pdf
In 2013- the housing market started picking up- Were people getting th.pdfIn 2013- the housing market started picking up- Were people getting th.pdf
In 2013- the housing market started picking up- Were people getting th.pdf
 
In 2011 the vitue af the Gop detenar in- In 2012- the watus of tie cos.pdf
In 2011 the vitue af the Gop detenar in- In 2012- the watus of tie cos.pdfIn 2011 the vitue af the Gop detenar in- In 2012- the watus of tie cos.pdf
In 2011 the vitue af the Gop detenar in- In 2012- the watus of tie cos.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

In a digital age where computers are connected via network and data ar.pdf

  • 1. In a digital age where computers are connected via network and data are stored on the cloud, this present challenges and risks. In May 2017, a widespread ransomware campaign is impacting global corporations, government entities and home users in multiple countries. The latest version of this ransomware variantknown as WannaCryor Wanna Decryptor- has spread rapidly over the weekend. Ransomware is a program that covertly installs on devices and either mounts an extortion attack that holds data hostage or locks operating systems until a ransom is paid. Research and discuss strategies to counteract such a threat at the personal, corporate, and national levels. word count (500 words) In a digital age where computers are connected via network and data are stored on the cloud, this present challenges and risks. In May 2017, a widespread ransomware campaign is impacting global corporations, government entities and home users in multiple countries. The latest version of this ransomware variantknown as WannaCryor Wanna Decryptor- has spread rapidly over the weekend. Ransomware is a program that covertly installs on devices and either mounts an extortion attack that holds data hostage or locks operating systems until a ransom is paid. Research and discuss strategies to counteract such a threat at the personal, corporate, and national levels. In a digital age where computers are connected via network and data are stored on the cloud, this present challenges and risks. In May 2017, a widespread ransomware campaign is impacting global corporations, government entities and home users in multiple countries. The latest version of this ransomware variantknown as WannaCryor Wanna Decryptor- has spread rapidly over the weekend. Ransomware is a program that covertly installs on devices and either mounts an extortion attack that holds data hostage or locks operating systems until a ransom is paid. Research and discuss strategies to counteract such a threat at the personal, corporate, and national levels. word count (500 words)