SlideShare a Scribd company logo
1 of 21
Sources• https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and-donts.html
• https://www.lastline.com/blog/crypto-malware-a-look-at-the-latest-malware-threat/
• https://phoenixnap.com/blog/ransomware-statistics-facts
• https://ng.cengage.com/static/nb/ui/evo/index.html?eISBN=9780357126196&id=525972252&snapshotId=1254626&
• https://securityintelligence.com/wp-content/uploads/2018/09/si-ransomware-101-feature-630x330.png
• https://images.idgesg.net/images/article/2017/10/ransomware-100739759-large.jpg
• https://securityintelligence.com/wp-content/uploads/2018/08/si-8-21-19-news-article2x-630x330.jpg
• https://cdn.ttgtmedia.com/rms/onlineimages/whatis-ransomware.png
• https://media2.govtech.com/images/940*529/shutterstock_599408072.jpg
• https://malwaretips.com/blogs/wp-content/uploads/2015/06/CryptoLocker-malware.jpg
• https://www.cryptofreaknetwork.com/wp-content/uploads/2019/09/new-glupteba-malware-striking-bitcoin-network.jpg
• https://assets.pcmag.com/media/images/603507-scareware-fake-results.png?thumb=y&width=980&height=470
• https://cdn.blog.tdstelecom.com/wp-content/uploads/2016/01/scareware-1.jpg
• http://blogs.egusd.net/infosec/files/2009/11/scareware.png
• https://images.techhive.com/images/article/2017/02/ransomware-100710984-large.jpg
• http://blog.escanav.com/wp-content/uploads/2017/03/Doxware.jpg
• https://sensorstechforum.com/wp-content/uploads/2016/10/doxware-confidential-sensorstechforum-malware.jpg
• https://www.fortinet.com/content/dam/fortinet-blog/new-images/uploads/dot-ransomware-yet-another-commission-based-ransomware-as-a-service-1385.png
• https://www.channelfutures.com/files/2019/01/Dos-and-Donts-877x432.jpg
• https://cytelcom.com/wp-content/uploads/2016/07/dont-pay-ransomware.png
• https://i.investopedia.com/dimages/graphics/financial_institution.png
• https://thumbor.forbes.com/thumbor/960x0/https%3A%2F%2Fblogs-images.forbes.com%2Fofx%2Ffiles%2F2018%2F09%2FOFX3-iStock-492595743-1200x800.jpg
• https://images.techhive.com/images/article/2015/12/internet_of_things_2015-100634979-large.jpg
• https://college.cengage.com/nextbook/shared/computer_education/cengage_9780357124826/images/9780357124826_mod6_0007-
t2.jpg?token=A0E92512D6236319C3A05DD072BC892703DE44D22B4267E30E662CB67A94CB14A87DAD1479869B4C927CC78A336DE6EAA822ED66B2B3FB8E2C7CF4916C391AA12B0B
2CFD0BA1CB50
• https://brightlineit.com/wp-content/uploads/2017/10/171013-How-to-Detect-and-Prevent-Ransomware-Attacks.jpg
• https://images.techhive.com/images/article/2014/11/user-friendly-coinvault-gui-100531674-primary.idge.jpg
• https://s3-us-west-2.amazonaws.com/cyberscoop-media/wp-content/uploads/2018/03/01145300/ransomware_drawing.jpg
• https://blog.trendmicro.com/what-is-ransomware-and-why-should-you-care/

More Related Content

Similar to Ransomware Presentation

Two-Factor Authentication Presentation
Two-Factor Authentication PresentationTwo-Factor Authentication Presentation
Two-Factor Authentication PresentationSamSmith537
 
Nonprofit IT Security Readiness for 2017
Nonprofit IT Security Readiness for 2017Nonprofit IT Security Readiness for 2017
Nonprofit IT Security Readiness for 2017Community IT Innovators
 
JavaScript Is Everywhere [Infographic]
JavaScript Is Everywhere [Infographic]JavaScript Is Everywhere [Infographic]
JavaScript Is Everywhere [Infographic]Catarina Cardoso
 
IT 101 Presentation
IT 101 PresentationIT 101 Presentation
IT 101 Presentationbostonben17
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
Internet tracking and private browsing
Internet tracking and private browsingInternet tracking and private browsing
Internet tracking and private browsingSvangestel
 
Exercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical IssuesExercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical Issuesclemwj
 
Threat Modeling: Report from the Trenches
Threat Modeling: Report from the TrenchesThreat Modeling: Report from the Trenches
Threat Modeling: Report from the TrenchesOWASP
 
PacNOG 27: Internet 101 — How secure are you?
PacNOG 27: Internet 101 — How secure are you?PacNOG 27: Internet 101 — How secure are you?
PacNOG 27: Internet 101 — How secure are you?APNIC
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT StrategyWSO2
 
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...PROIDEA
 
Detection Rules Coverage
Detection Rules CoverageDetection Rules Coverage
Detection Rules CoverageSunny Neo
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
The Advantages and Disadvantages of Large Institutions Using Gmail
The Advantages and Disadvantages of Large Institutions Using GmailThe Advantages and Disadvantages of Large Institutions Using Gmail
The Advantages and Disadvantages of Large Institutions Using GmailDT_CT231
 
Advantages and Disadvantages of Large Institutions using Gmail
Advantages and Disadvantages of Large Institutions using Gmail�Advantages and Disadvantages of Large Institutions using Gmail�
Advantages and Disadvantages of Large Institutions using GmailDT_CT231
 
What should I do when my website got hack?
What should I do when my website got hack?What should I do when my website got hack?
What should I do when my website got hack?Sumedt Jitpukdebodin
 

Similar to Ransomware Presentation (20)

Two-Factor Authentication Presentation
Two-Factor Authentication PresentationTwo-Factor Authentication Presentation
Two-Factor Authentication Presentation
 
Nonprofit IT Security Readiness for 2017
Nonprofit IT Security Readiness for 2017Nonprofit IT Security Readiness for 2017
Nonprofit IT Security Readiness for 2017
 
JavaScript Is Everywhere [Infographic]
JavaScript Is Everywhere [Infographic]JavaScript Is Everywhere [Infographic]
JavaScript Is Everywhere [Infographic]
 
IT 101 Presentation
IT 101 PresentationIT 101 Presentation
IT 101 Presentation
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
Final ppt
Final pptFinal ppt
Final ppt
 
Internet tracking and private browsing
Internet tracking and private browsingInternet tracking and private browsing
Internet tracking and private browsing
 
Exercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical IssuesExercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical Issues
 
Threat Modeling: Report from the Trenches
Threat Modeling: Report from the TrenchesThreat Modeling: Report from the Trenches
Threat Modeling: Report from the Trenches
 
PacNOG 27: Internet 101 — How secure are you?
PacNOG 27: Internet 101 — How secure are you?PacNOG 27: Internet 101 — How secure are you?
PacNOG 27: Internet 101 — How secure are you?
 
Cybersecurity fundamental
Cybersecurity fundamentalCybersecurity fundamental
Cybersecurity fundamental
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
[WSO2Con EU 2017] The Effects of Microservices on Corporate IT Strategy
 
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
CONFidence 2017: Hackers vs SOC - 12 hours to break in, 250 days to detect (G...
 
Detection Rules Coverage
Detection Rules CoverageDetection Rules Coverage
Detection Rules Coverage
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
The Advantages and Disadvantages of Large Institutions Using Gmail
The Advantages and Disadvantages of Large Institutions Using GmailThe Advantages and Disadvantages of Large Institutions Using Gmail
The Advantages and Disadvantages of Large Institutions Using Gmail
 
Advantages and Disadvantages of Large Institutions using Gmail
Advantages and Disadvantages of Large Institutions using Gmail�Advantages and Disadvantages of Large Institutions using Gmail�
Advantages and Disadvantages of Large Institutions using Gmail
 
Attack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition SystemsAttack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition Systems
 
What should I do when my website got hack?
What should I do when my website got hack?What should I do when my website got hack?
What should I do when my website got hack?
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Ransomware Presentation

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Sources• https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and-donts.html • https://www.lastline.com/blog/crypto-malware-a-look-at-the-latest-malware-threat/ • https://phoenixnap.com/blog/ransomware-statistics-facts • https://ng.cengage.com/static/nb/ui/evo/index.html?eISBN=9780357126196&id=525972252&snapshotId=1254626& • https://securityintelligence.com/wp-content/uploads/2018/09/si-ransomware-101-feature-630x330.png • https://images.idgesg.net/images/article/2017/10/ransomware-100739759-large.jpg • https://securityintelligence.com/wp-content/uploads/2018/08/si-8-21-19-news-article2x-630x330.jpg • https://cdn.ttgtmedia.com/rms/onlineimages/whatis-ransomware.png • https://media2.govtech.com/images/940*529/shutterstock_599408072.jpg • https://malwaretips.com/blogs/wp-content/uploads/2015/06/CryptoLocker-malware.jpg • https://www.cryptofreaknetwork.com/wp-content/uploads/2019/09/new-glupteba-malware-striking-bitcoin-network.jpg • https://assets.pcmag.com/media/images/603507-scareware-fake-results.png?thumb=y&width=980&height=470 • https://cdn.blog.tdstelecom.com/wp-content/uploads/2016/01/scareware-1.jpg • http://blogs.egusd.net/infosec/files/2009/11/scareware.png • https://images.techhive.com/images/article/2017/02/ransomware-100710984-large.jpg • http://blog.escanav.com/wp-content/uploads/2017/03/Doxware.jpg • https://sensorstechforum.com/wp-content/uploads/2016/10/doxware-confidential-sensorstechforum-malware.jpg • https://www.fortinet.com/content/dam/fortinet-blog/new-images/uploads/dot-ransomware-yet-another-commission-based-ransomware-as-a-service-1385.png • https://www.channelfutures.com/files/2019/01/Dos-and-Donts-877x432.jpg • https://cytelcom.com/wp-content/uploads/2016/07/dont-pay-ransomware.png • https://i.investopedia.com/dimages/graphics/financial_institution.png • https://thumbor.forbes.com/thumbor/960x0/https%3A%2F%2Fblogs-images.forbes.com%2Fofx%2Ffiles%2F2018%2F09%2FOFX3-iStock-492595743-1200x800.jpg • https://images.techhive.com/images/article/2015/12/internet_of_things_2015-100634979-large.jpg • https://college.cengage.com/nextbook/shared/computer_education/cengage_9780357124826/images/9780357124826_mod6_0007- t2.jpg?token=A0E92512D6236319C3A05DD072BC892703DE44D22B4267E30E662CB67A94CB14A87DAD1479869B4C927CC78A336DE6EAA822ED66B2B3FB8E2C7CF4916C391AA12B0B 2CFD0BA1CB50 • https://brightlineit.com/wp-content/uploads/2017/10/171013-How-to-Detect-and-Prevent-Ransomware-Attacks.jpg • https://images.techhive.com/images/article/2014/11/user-friendly-coinvault-gui-100531674-primary.idge.jpg • https://s3-us-west-2.amazonaws.com/cyberscoop-media/wp-content/uploads/2018/03/01145300/ransomware_drawing.jpg • https://blog.trendmicro.com/what-is-ransomware-and-why-should-you-care/