SlideShare a Scribd company logo
What is ransomware? How can these cyber-attacks result in data loss? In your experience, do
you believe ransomware attacks should be treated as a cybercrime? What are the possible
consequences of ransomware? Be sure to cite examples from credible sources to support your
answers.
Solution
Ransomware is a virus or malware of the computer which installs secretly on computer without
user authorization and encrypts the data that is present on the victims computer and in order to
decrypt that message it asks for payment for decryption. Yes this ransomware cyber attacks
result in data loss because the attacker demands the victim for money in order to give the decrypt
key whether if he has not paid the decrypt key will be lost and the data is also lost forever and
results in data loss.This ransomware is a cybercrime because so much of data is lost and they are
thefting the data and demands money from the victims in order to give the data it is like
kidnapping the data. The possible consequences of ransomware malware are dataloss and
datatheft. This malware are sent through the Email attachments and messages in social media
and whenever we click that it installs without authorization.

More Related Content

Similar to What is ransomware How can these cyber-attacks result in data loss.pdf

Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
mohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
mabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
ssuser77bda9
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
VarunJain65422
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
KeerthikaaThiyagaraj
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
JacobJose37
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
SASASASA93
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
BUSHRASHAIKH804312
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
1A245MohitTitarmare
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
ECoyShastriBhawan
 
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.pptCyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
AjitGouda4
 
Cyber security by vinod sencha for education
Cyber security by vinod sencha for educationCyber security by vinod sencha for education
Cyber security by vinod sencha for education
KanakKumarKanak1
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
chandakujjwal6
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
ssuser46d915
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
FarhanQuraishi4
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
AshaVijay11
 
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHCyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
bhaimeresuresh
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
UmeshBansal18
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
ArunBhagatt
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
Amna
 

Similar to What is ransomware How can these cyber-attacks result in data loss.pdf (20)

Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
cybertestqas.ppt
cybertestqas.pptcybertestqas.ppt
cybertestqas.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Direct infection: virus can infect files every time a user opens that specif...
Direct infection: virus can infect files every time a user  opens that specif...Direct infection: virus can infect files every time a user  opens that specif...
Direct infection: virus can infect files every time a user opens that specif...
 
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).pptCyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857 (1).ppt
 
Cyber-Security-power point presentation.
Cyber-Security-power point presentation.Cyber-Security-power point presentation.
Cyber-Security-power point presentation.
 
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.pptCyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
 
Cyber security by vinod sencha for education
Cyber security by vinod sencha for educationCyber security by vinod sencha for education
Cyber security by vinod sencha for education
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKHCyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 

More from infoeyecare

All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdfAll fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
infoeyecare
 
15. Let’s say you are systems administrator for a hospital’s network.pdf
15. Let’s say you are systems administrator for a hospital’s network.pdf15. Let’s say you are systems administrator for a hospital’s network.pdf
15. Let’s say you are systems administrator for a hospital’s network.pdf
infoeyecare
 
What would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdfWhat would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdf
infoeyecare
 
Write a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdfWrite a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdf
infoeyecare
 
wright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdfwright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdf
infoeyecare
 
Why are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdfWhy are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdf
infoeyecare
 
Which functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdfWhich functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdf
infoeyecare
 
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdfWhat is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
infoeyecare
 
What are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdfWhat are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdf
infoeyecare
 
Using the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdfUsing the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdf
infoeyecare
 
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdfuetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
infoeyecare
 
The starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdfThe starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdf
infoeyecare
 
Question 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdfQuestion 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdf
infoeyecare
 
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdfProblems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
infoeyecare
 
Only a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdfOnly a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdf
infoeyecare
 
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdfpackage lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
infoeyecare
 
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdfOdin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
infoeyecare
 
Many new species of desert have arisen from a population which was .pdf
Many new species of desert  have arisen from a  population which was .pdfMany new species of desert  have arisen from a  population which was .pdf
Many new species of desert have arisen from a population which was .pdf
infoeyecare
 
List and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdfList and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdf
infoeyecare
 
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdfJ. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
infoeyecare
 

More from infoeyecare (20)

All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdfAll fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
 
15. Let’s say you are systems administrator for a hospital’s network.pdf
15. Let’s say you are systems administrator for a hospital’s network.pdf15. Let’s say you are systems administrator for a hospital’s network.pdf
15. Let’s say you are systems administrator for a hospital’s network.pdf
 
What would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdfWhat would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdf
 
Write a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdfWrite a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdf
 
wright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdfwright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdf
 
Why are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdfWhy are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdf
 
Which functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdfWhich functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdf
 
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdfWhat is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
 
What are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdfWhat are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdf
 
Using the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdfUsing the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdf
 
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdfuetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
 
The starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdfThe starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdf
 
Question 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdfQuestion 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdf
 
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdfProblems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
 
Only a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdfOnly a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdf
 
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdfpackage lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
 
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdfOdin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
 
Many new species of desert have arisen from a population which was .pdf
Many new species of desert  have arisen from a  population which was .pdfMany new species of desert  have arisen from a  population which was .pdf
Many new species of desert have arisen from a population which was .pdf
 
List and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdfList and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdf
 
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdfJ. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

What is ransomware How can these cyber-attacks result in data loss.pdf

  • 1. What is ransomware? How can these cyber-attacks result in data loss? In your experience, do you believe ransomware attacks should be treated as a cybercrime? What are the possible consequences of ransomware? Be sure to cite examples from credible sources to support your answers. Solution Ransomware is a virus or malware of the computer which installs secretly on computer without user authorization and encrypts the data that is present on the victims computer and in order to decrypt that message it asks for payment for decryption. Yes this ransomware cyber attacks result in data loss because the attacker demands the victim for money in order to give the decrypt key whether if he has not paid the decrypt key will be lost and the data is also lost forever and results in data loss.This ransomware is a cybercrime because so much of data is lost and they are thefting the data and demands money from the victims in order to give the data it is like kidnapping the data. The possible consequences of ransomware malware are dataloss and datatheft. This malware are sent through the Email attachments and messages in social media and whenever we click that it installs without authorization.