SlideShare a Scribd company logo

Ransomware is malicious software that encrypts files and requires a.docx

B
B

course material

Ransomware is malicious software that encrypts files and requires a.docx

1 of 1
Download to read offline
Ransomware is malicious software that encrypts files and requires a
Ransomware is malicious software that encrypts files and requires a key to decrypt the
files. To get the files decrypted, the company or organization must typically pay the hackers
a large fee, often in Bitcoin or another cryptocurrency. It is important to note that
cryptocurrency payments are one-way transactions that are impossible to trace. There is
risk, too. If the hackers do not provide the organization with the decryption key after
payment, there is no refund.Hackers in recent years have targeted businesses such as
hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat
hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in
Florida.Read these brief articles from the UMGC library to learn about the ransomware
incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In.
New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom
to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the
ransom, it would need to either use backups to restore to an earlier network or system
state, or to rebuild its systems and data. In the case of the Baltimore city government, its
backup systems were also encrypted, so the city was unable to process real estate
transactions.Depending on the complexity of the environment and the amount of data
encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20
times the amount.What would you do if you were the cybersecurity analyst that had to
advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider
both sides of the argument by conducting internet research to understand the different
viewpoints. When you are ready, explain why you would or would not pay the ransom.If you
agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up
providing the decryption key to unlock the files or come back and ask for even more
money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if
the costs to restore far exceed the ransom?Are there ethical considerations? If your
organization pays, will other organizations be vulnerable to similar attacks on their
systems?Would you have a different decision if you were working for a small organization
like Mercury USA?
Ad

Recommended

Depending on the complexity of the environment and the amount of.docx
Depending on the complexity of the environment and the amount of.docxDepending on the complexity of the environment and the amount of.docx
Depending on the complexity of the environment and the amount of.docxsalmonpybus
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxtodd271
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Analysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsHeidi Maestas
 
TJX Data Breach Analysis
TJX Data Breach AnalysisTJX Data Breach Analysis
TJX Data Breach AnalysisHeidi Maestas
 
Notes On Law Office Management
Notes On Law Office ManagementNotes On Law Office Management
Notes On Law Office ManagementJennifer Letterman
 

More Related Content

Similar to Ransomware is malicious software that encrypts files and requires a.docx

Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxtodd521
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
PCI Compliance Analysis
PCI Compliance AnalysisPCI Compliance Analysis
PCI Compliance AnalysisPamela Wright
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Hacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of SystemsHacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of SystemsCandice Him
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Examples Of Actus Reus In Cyber Crime
Examples Of Actus Reus In Cyber CrimeExamples Of Actus Reus In Cyber Crime
Examples Of Actus Reus In Cyber CrimeCarolina Cardona
 

Similar to Ransomware is malicious software that encrypts files and requires a.docx (20)

Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
 
Ransomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacks
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
PCI Compliance Analysis
PCI Compliance AnalysisPCI Compliance Analysis
PCI Compliance Analysis
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
ihegc012
ihegc012ihegc012
ihegc012
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Hacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of SystemsHacking Is A Practice Of Art And The Features Of Systems
Hacking Is A Practice Of Art And The Features Of Systems
 
Cyber Crime In The United States
Cyber Crime In The United StatesCyber Crime In The United States
Cyber Crime In The United States
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
CyberCrime Essay
CyberCrime EssayCyberCrime Essay
CyberCrime Essay
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Examples Of Actus Reus In Cyber Crime
Examples Of Actus Reus In Cyber CrimeExamples Of Actus Reus In Cyber Crime
Examples Of Actus Reus In Cyber Crime
 
Cyber Crime And Transnational Crime Essay
Cyber Crime And Transnational Crime EssayCyber Crime And Transnational Crime Essay
Cyber Crime And Transnational Crime Essay
 

More from bkbk37

Rater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docxbkbk37
 
QUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docxbkbk37
 
Ratio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docxbkbk37
 
Rates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docxbkbk37
 
Rather than writing a literature review for your.docx
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docxbkbk37
 
Rather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docxbkbk37
 
Rapid Assessment of a Client.docx
Rapid Assessment of a Client.docxRapid Assessment of a Client.docx
Rapid Assessment of a Client.docxbkbk37
 
Rated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docxRated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docxbkbk37
 
Ranking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docxRanking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docxbkbk37
 
Range of.docx
Range of.docxRange of.docx
Range of.docxbkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docxbkbk37
 
Randomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docxRandomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docxbkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxbkbk37
 
Raising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docxRaising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docxbkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxbkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxbkbk37
 
Raffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docxRaffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docxbkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docxbkbk37
 
Race Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docxRace Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docxbkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docxbkbk37
 

More from bkbk37 (20)

Rater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docxRater Errors Associated with the Performance Management Systems.docx
Rater Errors Associated with the Performance Management Systems.docx
 
QUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docxQUESTION FIRM PERFORMANCE Report financial data.docx
QUESTION FIRM PERFORMANCE Report financial data.docx
 
Ratio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docxRatio analysis provides another set of patterns to evaluate before.docx
Ratio analysis provides another set of patterns to evaluate before.docx
 
Rates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docxRates Negotiation Crisis Premium Paper Help.docx
Rates Negotiation Crisis Premium Paper Help.docx
 
Rather than writing a literature review for your.docx
Rather than writing a literature review for your.docxRather than writing a literature review for your.docx
Rather than writing a literature review for your.docx
 
Rather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docxRather than focus on the treatment of chronic policies.docx
Rather than focus on the treatment of chronic policies.docx
 
Rapid Assessment of a Client.docx
Rapid Assessment of a Client.docxRapid Assessment of a Client.docx
Rapid Assessment of a Client.docx
 
Rated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docxRated Over iko na 5star 65 times.docx
Rated Over iko na 5star 65 times.docx
 
Ranking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docxRanking Universities systems Premium Paper Help.docx
Ranking Universities systems Premium Paper Help.docx
 
Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Randomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docxRandomised algorithms for travelling salesman problem.docx
Randomised algorithms for travelling salesman problem.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Raising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docxRaising Capital Create a document that you will present to.docx
Raising Capital Create a document that you will present to.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Raffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docxRaffel jeans management decides that the units is most likely.docx
Raffel jeans management decides that the units is most likely.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
Race Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docxRace Presentations on TV Premium Paper Help.docx
Race Presentations on TV Premium Paper Help.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 

Recently uploaded

CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptxCONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptxAnupkumar Sharma
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 
Detailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptxDetailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptxDrOsiaMajeed
 
LIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATIONLIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATIONSayali Powar
 
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATIONUNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATIONSayali Powar
 
Narrative Exploration of New Categories at Mondelēz
Narrative Exploration of New Categories at MondelēzNarrative Exploration of New Categories at Mondelēz
Narrative Exploration of New Categories at MondelēzRay Poynter
 
Chromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-PrincipleChromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-Principleblessipriyanka
 
Exit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docxExit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docxMYDA ANGELICA SUAN
 
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment ModelKochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Modelsandeepmenon62
 
Intuition behind Monte Carlo Markov Chains
Intuition behind Monte Carlo Markov ChainsIntuition behind Monte Carlo Markov Chains
Intuition behind Monte Carlo Markov ChainsTushar Tank
 
English 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptx
English 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptxEnglish 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptx
English 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptxRusselMartinezPagana
 
2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptx2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptxMaryPotorti1
 
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASMaria Lucia Céspedes
 
50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...
50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...
50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...Nguyen Thanh Tu Collection
 
The Ministry of Utmost Happiness by Arundhati Roy
The Ministry of Utmost Happiness by Arundhati RoyThe Ministry of Utmost Happiness by Arundhati Roy
The Ministry of Utmost Happiness by Arundhati RoyTrushali Dodiya
 
LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)
LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)
LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)satyanshp7890
 
Introduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxIntroduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxRenuka N Sunagad
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaFaheema Hasan
 
Media Relations for Public Relations Class
Media Relations for Public Relations ClassMedia Relations for Public Relations Class
Media Relations for Public Relations ClassCorinne Weisgerber
 
mean stack mean stack mean stack mean stack
mean stack mean stack  mean stack  mean stackmean stack mean stack  mean stack  mean stack
mean stack mean stack mean stack mean stackNuttavutThongjor1
 

Recently uploaded (20)

CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptxCONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
CONCEPTS OF ENVIRONMENT & ECOSYSTEM.pptx
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 
Detailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptxDetailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptx
 
LIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATIONLIPIDS UNIT ONE BIOMOLECULE PRESENTATION
LIPIDS UNIT ONE BIOMOLECULE PRESENTATION
 
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATIONUNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
UNIT 1 BIOMOLECULE_CARBOHYDRATES PRESENTATION
 
Narrative Exploration of New Categories at Mondelēz
Narrative Exploration of New Categories at MondelēzNarrative Exploration of New Categories at Mondelēz
Narrative Exploration of New Categories at Mondelēz
 
Chromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-PrincipleChromatography-Gas chromatography-Principle
Chromatography-Gas chromatography-Principle
 
Exit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docxExit Essay - Save the Filipino Language by Renz Perez.docx
Exit Essay - Save the Filipino Language by Renz Perez.docx
 
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment ModelKochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
 
Intuition behind Monte Carlo Markov Chains
Intuition behind Monte Carlo Markov ChainsIntuition behind Monte Carlo Markov Chains
Intuition behind Monte Carlo Markov Chains
 
English 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptx
English 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptxEnglish 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptx
English 7-Quarter 3-Module 3-FACTORS THAT MAY INFLUENCE LITERATURE.pptx
 
2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptx2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptx
 
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
 
50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...
50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...
50 ĐỀ THI THỬ TỐT NGHIỆP THPT TIẾNG ANH 2024 CÓ GIẢI CHI TIẾT - GIỚI HẠN KHO...
 
The Ministry of Utmost Happiness by Arundhati Roy
The Ministry of Utmost Happiness by Arundhati RoyThe Ministry of Utmost Happiness by Arundhati Roy
The Ministry of Utmost Happiness by Arundhati Roy
 
LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)
LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)
LIGHT,MIRROR,REFLECTION& REFRACTION. (Optometric optics)
 
Introduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxIntroduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptx
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic Leukemia
 
Media Relations for Public Relations Class
Media Relations for Public Relations ClassMedia Relations for Public Relations Class
Media Relations for Public Relations Class
 
mean stack mean stack mean stack mean stack
mean stack mean stack  mean stack  mean stackmean stack mean stack  mean stack  mean stack
mean stack mean stack mean stack mean stack
 

Ransomware is malicious software that encrypts files and requires a.docx

  • 1. Ransomware is malicious software that encrypts files and requires a Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.Read these brief articles from the UMGC library to learn about the ransomware incidents:Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?Would you have a different decision if you were working for a small organization like Mercury USA?