SlideShare a Scribd company logo
1/20
Contents:
Basic Introduction and Countermeasures to
Ransomware Threats
Darwish Ahmad Herati1
, A.M.Bojamma2
, Dr.M.P. Indira Gandhi3
[1]. Department of Computer Science, St. Joseph’s College Bangalore
[2]. Assistant Professor, Department of Computer Science, St. Joseph’s College &
Research Scholar. Mother Teresa Women’s University
[3]. Assistant Professor, Department of Computer Science, Mother Teresa
Women’s University.
February 17, 2017
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
2/20
Contents:
Contents
1 Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
3/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Malware (Malicious Software)
Malware ANY program or file that is harmful to a computer
(mobile devices, etc.) user is called Malware or malicious
software. That includes viruses, worms, Trojan horses,
Spyware etc.
Ransomware!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
4/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Diagram:
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
5/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Statistics:Countries by Percentage
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
6/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Statistics: By types of Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
7/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Types of Ransomware:
1- Crypto-Ransomware: (Data Locker) Prevent access
to personal files, Encrypting Symmetric, Asymmetric
2- Locker-Ransomware: (Computer Locker) Denies
access to computer/mobile device/system.
Operating Systems:
Microsoft: Windows Client/Server Versions
Linux: Linux Client/Server Distributions/Versions
OS X: OS X Client/Server Versions
Android/iOS: for handhold devices (Phones, Tablets, TVs etc.)
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
8/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Targets of Ransomware
General/ Home Users
Businesses, Companies and Organizations
Public agencies and Government
Systems Affected by Ransomware :
Personal Computers
Mobile Devices
Servers
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
9/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
10/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
11/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Locker-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
12/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Example of Ransomware: Google Drive
Crypto-Ransomware
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
13/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
How you get infected:
Propagation Ways:
Traffic Distribution System (TDS)
Malvertisement (Malware Advertisement)
Spam Email
Downloaders
Social Engineering and Self-propagation
Affiliate Scheme of Spreading
Other Ways you know...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
14/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Ransomware Victim Manipulation Techniques:
Economics: Amount of money, type...
Psychology: Time limit, Demo of decrypting...
Social Engineering: Spreading Techniques, Spam...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
15/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Countermeasures and Prevention:
Educate Staff and Inform
Update the System and Patching Software
Use a layered defense approach
Endpoint Security solution
Advise for mobile/tablet device users
Use Network Protection
Make Backups and have a Disciplined Plan
Worst State: tools to remove, Shadow copies, No
Bulletproof solution
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
16/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Suggested Solution:
Use Automatic Snapshot (State Saver) Technology:
Hardware-Based and Software Based
Hardware-Based: for companies and enterprise
industries, Government etc.
Software-Based: for Home users and personal
Computers etc.
Demo!!!
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
17/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Conclusion
Problem Statement:
Malwrare: Ransomware: Cryto,Locker
Operating Systems: Microsoft, Linux, OS X, Android...
Targets and Propagation
Home Users, Businesses, Public Agencies, Government etc.
System Affected: PCs, Mobile Devices, Servers
Countermeasures and Prevention Solution
Educate Staff, Update Systems, Layered/Endpoint Security,
Backups
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
18/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Further Research:
Malware Analysis and Reverse Engineering of
Ransomware in depth...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
19/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
References
Hunter Hoffmann, Karthikeyan Ramasamy. (October 26,
2016). Beazley project ransomware attack to quadruple in
2016.
McAfee Lab, (2009). Ransomware-Petya. McAfee Labs
Threat Advisory: April 11, 2016.
Kevin Savage, Peter Coogan and Hon Lau . (2015).The
Evolution of Ransomware. August 6, 2015
etc...
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
20/20
Contents:
Introduction
Ransomware
How you get infected
Countermeasures and Prevention
Suggested Solution:
Conclusion
Further Research
References
Thank You For Your
Attention
St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats

More Related Content

Viewers also liked

Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
Orlando Simões
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesLuis Nassif
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasures
securityxploded
 
Formulario 3C
Formulario 3CFormulario 3C
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
AirTight Networks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
warwick_amr
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
Jason Edelstein
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
Sergey Rubinsky, Ph.D.
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
American Astronautical Society
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
International Atomic Energy Agency
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
polichen
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Campus Party Brasil
 
Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)
vjgarciaq
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programming
hybr1s
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.
Marko Kovic
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasuresguestc27cd9
 

Viewers also liked (18)

Apresentação Cyberpunk
Apresentação CyberpunkApresentação Cyberpunk
Apresentação Cyberpunk
 
Brigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga GomesBrigadeiro Engº VenâNcio Alvarenga Gomes
Brigadeiro Engº VenâNcio Alvarenga Gomes
 
Antivirus Evasion Techniques and Countermeasures
Antivirus  Evasion Techniques and CountermeasuresAntivirus  Evasion Techniques and Countermeasures
Antivirus Evasion Techniques and Countermeasures
 
Formulario 3C
Formulario 3CFormulario 3C
Formulario 3C
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Dstl Medical Countermeasures for Dangerous Pathogens
Dstl   Medical Countermeasures for Dangerous PathogensDstl   Medical Countermeasures for Dangerous Pathogens
Dstl Medical Countermeasures for Dangerous Pathogens
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Seminar Presentation
Seminar PresentationSeminar Presentation
Seminar Presentation
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na praticaPenetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
Penetration Test (Teste de invasão) – Saiba como ser um Hacker ético na pratica
 
Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)Certified Information Security Professional (CISP)
Certified Information Security Professional (CISP)
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programming
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasures
 

Similar to Basic introduction and countermeasures to ransomware threats presentation

The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
phexcom1
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
drennanmicah
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
licservernoida
 
Running head STUDY OF RANSOMWARE .docx
Running head STUDY OF RANSOMWARE                                 .docxRunning head STUDY OF RANSOMWARE                                 .docx
Running head STUDY OF RANSOMWARE .docx
jeanettehully
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
Lumension
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
April Dillard
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
Sophos Benelux
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
Mark D. Webster, Ph.D.
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
Norman Johnson
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
karishmakittu
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
Lumension
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
stirlingvwriters
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
Fraunhofer AISEC
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
Mumbere Joab
 

Similar to Basic introduction and countermeasures to ransomware threats presentation (20)

The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Running head STUDY OF RANSOMWARE .docx
Running head STUDY OF RANSOMWARE                                 .docxRunning head STUDY OF RANSOMWARE                                 .docx
Running head STUDY OF RANSOMWARE .docx
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
C3
C3C3
C3
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
ISSC451 Cybercrime.docx
ISSC451 Cybercrime.docxISSC451 Cybercrime.docx
ISSC451 Cybercrime.docx
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 

More from Darwish Ahmad

Lecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer NetworksLecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer Networks
Darwish Ahmad
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
Darwish Ahmad
 
Countermeasures To Ransomware Threats
Countermeasures To Ransomware ThreatsCountermeasures To Ransomware Threats
Countermeasures To Ransomware Threats
Darwish Ahmad
 
Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring
Darwish Ahmad
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
Darwish Ahmad
 
Designing Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDesigning Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : Documentation
Darwish Ahmad
 

More from Darwish Ahmad (6)

Lecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer NetworksLecture 1 Introduction to Computer Networks
Lecture 1 Introduction to Computer Networks
 
Lecture 1 Introduction to Network Security
Lecture 1 Introduction to Network SecurityLecture 1 Introduction to Network Security
Lecture 1 Introduction to Network Security
 
Countermeasures To Ransomware Threats
Countermeasures To Ransomware ThreatsCountermeasures To Ransomware Threats
Countermeasures To Ransomware Threats
 
Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
 
Designing Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDesigning Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : Documentation
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Basic introduction and countermeasures to ransomware threats presentation

  • 1. 1/20 Contents: Basic Introduction and Countermeasures to Ransomware Threats Darwish Ahmad Herati1 , A.M.Bojamma2 , Dr.M.P. Indira Gandhi3 [1]. Department of Computer Science, St. Joseph’s College Bangalore [2]. Assistant Professor, Department of Computer Science, St. Joseph’s College & Research Scholar. Mother Teresa Women’s University [3]. Assistant Professor, Department of Computer Science, Mother Teresa Women’s University. February 17, 2017 St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 2. 2/20 Contents: Contents 1 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 3. 3/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Malware (Malicious Software) Malware ANY program or file that is harmful to a computer (mobile devices, etc.) user is called Malware or malicious software. That includes viruses, worms, Trojan horses, Spyware etc. Ransomware!!! St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 4. 4/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Diagram: St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 5. 5/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Statistics:Countries by Percentage St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 6. 6/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Statistics: By types of Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 7. 7/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Types of Ransomware: 1- Crypto-Ransomware: (Data Locker) Prevent access to personal files, Encrypting Symmetric, Asymmetric 2- Locker-Ransomware: (Computer Locker) Denies access to computer/mobile device/system. Operating Systems: Microsoft: Windows Client/Server Versions Linux: Linux Client/Server Distributions/Versions OS X: OS X Client/Server Versions Android/iOS: for handhold devices (Phones, Tablets, TVs etc.) St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 8. 8/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Targets of Ransomware General/ Home Users Businesses, Companies and Organizations Public agencies and Government Systems Affected by Ransomware : Personal Computers Mobile Devices Servers St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 9. 9/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Crypto-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 10. 10/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Crypto-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 11. 11/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Locker-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 12. 12/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Example of Ransomware: Google Drive Crypto-Ransomware St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 13. 13/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References How you get infected: Propagation Ways: Traffic Distribution System (TDS) Malvertisement (Malware Advertisement) Spam Email Downloaders Social Engineering and Self-propagation Affiliate Scheme of Spreading Other Ways you know... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 14. 14/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Ransomware Victim Manipulation Techniques: Economics: Amount of money, type... Psychology: Time limit, Demo of decrypting... Social Engineering: Spreading Techniques, Spam... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 15. 15/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Countermeasures and Prevention: Educate Staff and Inform Update the System and Patching Software Use a layered defense approach Endpoint Security solution Advise for mobile/tablet device users Use Network Protection Make Backups and have a Disciplined Plan Worst State: tools to remove, Shadow copies, No Bulletproof solution St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 16. 16/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Suggested Solution: Use Automatic Snapshot (State Saver) Technology: Hardware-Based and Software Based Hardware-Based: for companies and enterprise industries, Government etc. Software-Based: for Home users and personal Computers etc. Demo!!! St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 17. 17/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Conclusion Problem Statement: Malwrare: Ransomware: Cryto,Locker Operating Systems: Microsoft, Linux, OS X, Android... Targets and Propagation Home Users, Businesses, Public Agencies, Government etc. System Affected: PCs, Mobile Devices, Servers Countermeasures and Prevention Solution Educate Staff, Update Systems, Layered/Endpoint Security, Backups St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 18. 18/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Further Research: Malware Analysis and Reverse Engineering of Ransomware in depth... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 19. 19/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References References Hunter Hoffmann, Karthikeyan Ramasamy. (October 26, 2016). Beazley project ransomware attack to quadruple in 2016. McAfee Lab, (2009). Ransomware-Petya. McAfee Labs Threat Advisory: April 11, 2016. Kevin Savage, Peter Coogan and Hon Lau . (2015).The Evolution of Ransomware. August 6, 2015 etc... St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats
  • 20. 20/20 Contents: Introduction Ransomware How you get infected Countermeasures and Prevention Suggested Solution: Conclusion Further Research References Thank You For Your Attention St. Joseph’s College (Autonomous) Bangalore Countermeasures to Ransomware Threats