SlideShare a Scribd company logo
Please answer ASAP!!!
Research Topic: Ransomware attack on k-12 schools (2013-present)
BLUF Statement: The persistent surge in ransomware attacks targeting K-12 schools underscores
the urgent need for enhanced cybersecurity measures, as a failure to address this issue will likely
lead to disruptions of education and compromised student data, endangering the future of our
education system.
Scope Note: This research paper will provide a comprehensive overview of ransomware attacks
on K-12 schools to address the alarming rise in ransomware attacks from 2013 to present. The
paper will focus on the frequency, vulnerabilities, evolving tactics, consequences, and
significance of these attacks, as well as the need for proactive cybersecurity measures. It will not
address ransomware incidents in other sectors or provide an extensive historical overview of
ransomware. This work will build on previous research on ransomware attacks on K-12 schools,
but it takes a new approach by focusing on five key points. The information will be current as of
September 30, 2023.
Based on the information, answer the following:
Treat something about your chosen term paper assignment as a High Impact Low Probability
(black swan) event. Think of
your event and then think of what black swan event could come next (but has not happened, yet).
You must:
Define 2 pathways
Identify 3 trigger points/changes in momentum for each of the 2 pathways
Identify 2 observables for each of the 6 trigger points
Identify 2 factors to deflect each of the 6 trigger points.
Briefly explain everything!
Examples of what your High Impact Low Probability event could be:
the malicious actors behind your event committing a radically different TTP, such as hacktivists
using multiple 0days
in one attack or a ransomware gang switching to stealing files for espionage purposes;
the TTP changes in a radical way, such as the ransomware actors suddenly switching back to
opportunistic targeting
with low ransoms against many victims;
a new leak of information for a clearly different purposes, such as journalists receiving a large
dump of files that
expose ransomware gangs instead of political/financial crimes; or
information that indicates country 1 was using denial and deception techniques to make it look
like country 2 was
behind your incident but it was really country 1 all along.
High Impact Low Probability Analysis
Highlights a seemingly unlikely event that would have major policy consequences if it
happened.
Use when its unlikely but would have substantial impact if it happened
Use when there are concerns that policymakers and decision makers are ignoring the
consequences of a potential event they should be concerned about
Help uncover hidden relationships and key factors
Identify oversights in the mainstream analytic line
Periodic review helps counter prevailing mind-set errors
High Impact Low Probability Analysis
1. Define the outcome (consequences)
2. Define pathways to the event as precisely as possible
3. Identify trigger points or changes in momentum
4. Identify key observables for each pathway
5. Identify factors to deflect the outcome/encourage a positive outcome
Please answer right and well enough to get the point across. Please no plagiarism. Thank you!

More Related Content

Similar to Please answer ASAP!!!Research Topic Ransomware attack on k-12 sch.pdf

Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
sukiennong.vn
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
jasoninnes20
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
Omer Coskun
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
David Sweigert
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
aryan532920
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
For the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justicFor the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justic
LilianaJohansen814
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
Matthew Rosenquist
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
Sangram Gayal
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
Andrey Apuhtin
 
sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdf
Dennis Reyes
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
stilliegeorgiana
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
AlienVault
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
cargillfilberto
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
drandy1
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
Dendreon
 
Threat_intelligence_Handbook
Threat_intelligence_HandbookThreat_intelligence_Handbook
Threat_intelligence_Handbook
Bruno Rafael
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
Paul Wright MSc
 

Similar to Please answer ASAP!!!Research Topic Ransomware attack on k-12 sch.pdf (20)

Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
For the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justicFor the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justic
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdf
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Threat_intelligence_Handbook
Threat_intelligence_HandbookThreat_intelligence_Handbook
Threat_intelligence_Handbook
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
 

More from support58

Please show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdfPlease show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdf
support58
 
Please show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdfPlease show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdf
support58
 
Please help with the below 3 questions, the python script is at the.pdf
Please help with the below 3  questions, the python script is at the.pdfPlease help with the below 3  questions, the python script is at the.pdf
Please help with the below 3 questions, the python script is at the.pdf
support58
 
please help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdfplease help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdf
support58
 
Please help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdfPlease help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdf
support58
 
Please create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdfPlease create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdf
support58
 
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdfPlease complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
support58
 
Plan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdfPlan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdf
support58
 
Part I.pdf
Part I.pdfPart I.pdf
Part I.pdf
support58
 
Part 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdfPart 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdf
support58
 

More from support58 (10)

Please show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdfPlease show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdf
 
Please show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdfPlease show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdf
 
Please help with the below 3 questions, the python script is at the.pdf
Please help with the below 3  questions, the python script is at the.pdfPlease help with the below 3  questions, the python script is at the.pdf
Please help with the below 3 questions, the python script is at the.pdf
 
please help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdfplease help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdf
 
Please help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdfPlease help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdf
 
Please create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdfPlease create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdf
 
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdfPlease complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
 
Plan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdfPlan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdf
 
Part I.pdf
Part I.pdfPart I.pdf
Part I.pdf
 
Part 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdfPart 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdf
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Please answer ASAP!!!Research Topic Ransomware attack on k-12 sch.pdf

  • 1. Please answer ASAP!!! Research Topic: Ransomware attack on k-12 schools (2013-present) BLUF Statement: The persistent surge in ransomware attacks targeting K-12 schools underscores the urgent need for enhanced cybersecurity measures, as a failure to address this issue will likely lead to disruptions of education and compromised student data, endangering the future of our education system. Scope Note: This research paper will provide a comprehensive overview of ransomware attacks on K-12 schools to address the alarming rise in ransomware attacks from 2013 to present. The paper will focus on the frequency, vulnerabilities, evolving tactics, consequences, and significance of these attacks, as well as the need for proactive cybersecurity measures. It will not address ransomware incidents in other sectors or provide an extensive historical overview of ransomware. This work will build on previous research on ransomware attacks on K-12 schools, but it takes a new approach by focusing on five key points. The information will be current as of September 30, 2023. Based on the information, answer the following: Treat something about your chosen term paper assignment as a High Impact Low Probability (black swan) event. Think of your event and then think of what black swan event could come next (but has not happened, yet). You must: Define 2 pathways Identify 3 trigger points/changes in momentum for each of the 2 pathways Identify 2 observables for each of the 6 trigger points Identify 2 factors to deflect each of the 6 trigger points. Briefly explain everything! Examples of what your High Impact Low Probability event could be: the malicious actors behind your event committing a radically different TTP, such as hacktivists using multiple 0days in one attack or a ransomware gang switching to stealing files for espionage purposes; the TTP changes in a radical way, such as the ransomware actors suddenly switching back to opportunistic targeting with low ransoms against many victims; a new leak of information for a clearly different purposes, such as journalists receiving a large dump of files that
  • 2. expose ransomware gangs instead of political/financial crimes; or information that indicates country 1 was using denial and deception techniques to make it look like country 2 was behind your incident but it was really country 1 all along. High Impact Low Probability Analysis Highlights a seemingly unlikely event that would have major policy consequences if it happened. Use when its unlikely but would have substantial impact if it happened Use when there are concerns that policymakers and decision makers are ignoring the consequences of a potential event they should be concerned about Help uncover hidden relationships and key factors Identify oversights in the mainstream analytic line Periodic review helps counter prevailing mind-set errors High Impact Low Probability Analysis 1. Define the outcome (consequences) 2. Define pathways to the event as precisely as possible 3. Identify trigger points or changes in momentum 4. Identify key observables for each pathway 5. Identify factors to deflect the outcome/encourage a positive outcome Please answer right and well enough to get the point across. Please no plagiarism. Thank you!