SlideShare a Scribd company logo
1 of 17
RANSOMWARE
20SS02IT001 DEV AKABARI
Mr. Ravirajsinh Chauhan
Mr. Mitul Patel
CYBER SECURITY
INDEX
PAGE 3
INTRODUCTION OF
AREA
PAGE 7
INTRODUCTION OF
RANSOMWARE
PAGE 8
RANSOMWARE
DIAGRAM
PAGE 9
RANSOMWARE
EXPLANATION
PAGE 10
RESEARCH PAPER
PAGE 13
RANSOMWARE
CASE STUDY
PAGE 14
CONCLUSION
PAGE 14
REFERENCES
AREA
CYBER SECURITY
What is Cyber Security?
Cyber Security is a process that’s designed to protect
networks and devices from external threats.
Types of
Cyber Crimes
DOS
1 Malware
2
Man in the Middle
3 Phishing
4
MALWARE ATTACK
Where victims are hit with a worm or virus that renders
their devices useless
DOS ATTACK
Where a hacker consumes all of a server’s resources,
so there’s nothing for legitimate users to access
01
02
Phishing ATTACK
Where a hacker sends a seemingly legitimate-looking
email asking users to disclose personal information
Man in the MIDDLE
03
04
Where a hacker puts himself between a victim’s
machine and a router to sniff data packets
INTRODUCTION
RANSOMEWARE is a one type of malware
that attempts to extort money from a
computer user by encrypting it’s machine or
data that stored in users device.
In short it is a encryptor that use by hacker to
extort money from users.
RANSOMWARE
DIAGRAM
One of the most common delivery systems
is spam-attachments that can to the
victim in an email as a file they should
trust.
Once they’re downloaded and opened,
they can take over the victim's computer.
RANSOMWARE is social engineering tool
And it is vary easy efficient or anonymous
activity.
It will encrypt the victim's files using a
randomly generated symmetric key.
These keys often use Advanced Encryption
Standard (AES)-256, it is 256 bits in key
length.
EXPLANATION
RANSOMWARE
ATTACK 2017
RESEARCH PAPER
RANSOMWARE
A RESEARCH AND A PERSONAL CASE STUDY OF
DEALING WITH THIS NASTY MALWARE
Biggest Ransomware Attacks of All Time
Ransomware has been a prominent threat to
enterprises, SMBs, and individuals alike since the mid-
2000s
HISTORY OF
RANSOMWARE
Slideck
In 2017, the FBI’s Internet Crime Complaint Centre(IC3) received 1,783
ransomware complaints that cost victims over $2.3 million. Those
complaints, however, represent only the attacks reported to IC3. The actual
number of ransomware attacks and costs are much higher. In fact, there
were an estimated 184 million ransomware attacks last year alone.
Ransomware was originally intended to target individuals, who still comprise
the majority of attacks today.
CASE STUDY
2017
The victim:
A construction management company suffered a devastating ransomware attack
infecting their backups and internal work stations, paralyzing the company’s ability to
function at capacity and leaving 30 employees unable to work for 10 days while having
their data held for ransom.
Conclusion of
ransomware attacks 2017
Conclusion
Ransomware is not only threats to small business and organization it has an impact on people as well. We use
antivirus systems and make UpToDate our devices and computers.
Future Work of
RANSOMWARE
Preparing for the Next Generation of Ransomware Attacks. ... According to reports, ransomware attacks netted
hackers some $25 billion in 2019. The stakes have only continued to rise since then as more organizations fall
victim to this form of attack and the dollar amounts mount higher and higher.
REFERENCES
1. https://www.upguard.com/blog/ransomware-
examples
2. https://www.exabeam.com/wp-
content/uploads/2017/07/Exabeam_Ransomw
are_Threat_Report_Final.pdf
3. https://www.kaspersky.com/resource-
center/threats/biggest-ransomware-threats-
2017
4. https://symantec-enterprise-
blogs.security.com/blogs/threat-
intelligence/wannacry-ransomware-attack
5. https://www.trendmicro.com/vinfo/us/security/d
efinition/ransomware
THANK
YOU

More Related Content

What's hot

What's hot (20)

Flashpoint ransomware april2016
Flashpoint ransomware april2016Flashpoint ransomware april2016
Flashpoint ransomware april2016
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
Ransomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breachRansomware: Prevention, privacy and your options post-breach
Ransomware: Prevention, privacy and your options post-breach
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....How Zyxel UTM Stops Ransomware....
How Zyxel UTM Stops Ransomware....
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 

Similar to Ransomware

What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 

Similar to Ransomware (20)

How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is ransomware
What is ransomwareWhat is ransomware
What is ransomware
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Security
SecuritySecurity
Security
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016Nominum Data Science Security Report, Fall 2016
Nominum Data Science Security Report, Fall 2016
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 

Ransomware

  • 1. RANSOMWARE 20SS02IT001 DEV AKABARI Mr. Ravirajsinh Chauhan Mr. Mitul Patel CYBER SECURITY
  • 2. INDEX PAGE 3 INTRODUCTION OF AREA PAGE 7 INTRODUCTION OF RANSOMWARE PAGE 8 RANSOMWARE DIAGRAM PAGE 9 RANSOMWARE EXPLANATION PAGE 10 RESEARCH PAPER PAGE 13 RANSOMWARE CASE STUDY PAGE 14 CONCLUSION PAGE 14 REFERENCES
  • 3. AREA CYBER SECURITY What is Cyber Security? Cyber Security is a process that’s designed to protect networks and devices from external threats.
  • 4. Types of Cyber Crimes DOS 1 Malware 2 Man in the Middle 3 Phishing 4
  • 5. MALWARE ATTACK Where victims are hit with a worm or virus that renders their devices useless DOS ATTACK Where a hacker consumes all of a server’s resources, so there’s nothing for legitimate users to access 01 02
  • 6. Phishing ATTACK Where a hacker sends a seemingly legitimate-looking email asking users to disclose personal information Man in the MIDDLE 03 04 Where a hacker puts himself between a victim’s machine and a router to sniff data packets
  • 7. INTRODUCTION RANSOMEWARE is a one type of malware that attempts to extort money from a computer user by encrypting it’s machine or data that stored in users device. In short it is a encryptor that use by hacker to extort money from users.
  • 8. RANSOMWARE DIAGRAM One of the most common delivery systems is spam-attachments that can to the victim in an email as a file they should trust. Once they’re downloaded and opened, they can take over the victim's computer.
  • 9. RANSOMWARE is social engineering tool And it is vary easy efficient or anonymous activity. It will encrypt the victim's files using a randomly generated symmetric key. These keys often use Advanced Encryption Standard (AES)-256, it is 256 bits in key length. EXPLANATION
  • 10. RANSOMWARE ATTACK 2017 RESEARCH PAPER RANSOMWARE A RESEARCH AND A PERSONAL CASE STUDY OF DEALING WITH THIS NASTY MALWARE
  • 11. Biggest Ransomware Attacks of All Time Ransomware has been a prominent threat to enterprises, SMBs, and individuals alike since the mid- 2000s HISTORY OF RANSOMWARE
  • 12. Slideck In 2017, the FBI’s Internet Crime Complaint Centre(IC3) received 1,783 ransomware complaints that cost victims over $2.3 million. Those complaints, however, represent only the attacks reported to IC3. The actual number of ransomware attacks and costs are much higher. In fact, there were an estimated 184 million ransomware attacks last year alone. Ransomware was originally intended to target individuals, who still comprise the majority of attacks today.
  • 13. CASE STUDY 2017 The victim: A construction management company suffered a devastating ransomware attack infecting their backups and internal work stations, paralyzing the company’s ability to function at capacity and leaving 30 employees unable to work for 10 days while having their data held for ransom.
  • 14. Conclusion of ransomware attacks 2017 Conclusion Ransomware is not only threats to small business and organization it has an impact on people as well. We use antivirus systems and make UpToDate our devices and computers.
  • 15. Future Work of RANSOMWARE Preparing for the Next Generation of Ransomware Attacks. ... According to reports, ransomware attacks netted hackers some $25 billion in 2019. The stakes have only continued to rise since then as more organizations fall victim to this form of attack and the dollar amounts mount higher and higher.
  • 16. REFERENCES 1. https://www.upguard.com/blog/ransomware- examples 2. https://www.exabeam.com/wp- content/uploads/2017/07/Exabeam_Ransomw are_Threat_Report_Final.pdf 3. https://www.kaspersky.com/resource- center/threats/biggest-ransomware-threats- 2017 4. https://symantec-enterprise- blogs.security.com/blogs/threat- intelligence/wannacry-ransomware-attack 5. https://www.trendmicro.com/vinfo/us/security/d efinition/ransomware