SlideShare a Scribd company logo
1 of 2
Download to read offline
Please answer ASAP!!!
Research Topic: Ransomware attack on k-12 schools (2013-present)
BLUF Statement: The persistent surge in ransomware attacks targeting K-12 schools underscores
the urgent need for enhanced cybersecurity measures, as a failure to address this issue will likely
lead to disruptions of education and compromised student data, endangering the future of our
education system.
Scope Note: This research paper will provide a comprehensive overview of ransomware attacks
on K-12 schools to address the alarming rise in ransomware attacks from 2013 to present. The
paper will focus on the frequency, vulnerabilities, evolving tactics, consequences, and
significance of these attacks, as well as the need for proactive cybersecurity measures. It will not
address ransomware incidents in other sectors or provide an extensive historical overview of
ransomware. This work will build on previous research on ransomware attacks on K-12 schools,
but it takes a new approach by focusing on five key points. The information will be current as of
September 30, 2023.
Based on the information, answer the following:
Treat something about your chosen term paper assignment as a High Impact Low Probability
(black swan) event. Think of
your event and then think of what black swan event could come next (but has not happened, yet).
You must:
Define 2 pathways
Identify 3 trigger points/changes in momentum for each of the 2 pathways
Identify 2 observables for each of the 6 trigger points
Identify 2 factors to deflect each of the 6 trigger points.
Briefly explain everything!
Examples of what your High Impact Low Probability event could be:
the malicious actors behind your event committing a radically different TTP, such as hacktivists
using multiple 0days
in one attack or a ransomware gang switching to stealing files for espionage purposes;
the TTP changes in a radical way, such as the ransomware actors suddenly switching back to
opportunistic targeting
with low ransoms against many victims;
a new leak of information for a clearly different purposes, such as journalists receiving a large
dump of files that
expose ransomware gangs instead of political/financial crimes; or
information that indicates country 1 was using denial and deception techniques to make it look
like country 2 was
behind your incident but it was really country 1 all along.
High Impact Low Probability Analysis
Highlights a seemingly unlikely event that would have major policy consequences if it
happened.
Use when its unlikely but would have substantial impact if it happened
Use when there are concerns that policymakers and decision makers are ignoring the
consequences of a potential event they should be concerned about
Help uncover hidden relationships and key factors
Identify oversights in the mainstream analytic line
Periodic review helps counter prevailing mind-set errors
High Impact Low Probability Analysis
1. Define the outcome (consequences)
2. Define pathways to the event as precisely as possible
3. Identify trigger points or changes in momentum
4. Identify key observables for each pathway
5. Identify factors to deflect the outcome/encourage a positive outcome
Please answer right and well enough to get the point across. Please no plagiarism. Thank you!

More Related Content

Similar to Please answer ASAP!!!Research Topic Ransomware attack on k-12 sch.pdf

Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxjasoninnes20
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesDavid Sweigert
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docxaryan532920
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
For the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justicFor the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justicLilianaJohansen814
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksSangram Gayal
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfDennis Reyes
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxstilliegeorgiana
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxcargillfilberto
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxdrandy1
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - HackersDendreon
 
Threat_intelligence_Handbook
Threat_intelligence_HandbookThreat_intelligence_Handbook
Threat_intelligence_HandbookBruno Rafael
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...Paul Wright MSc
 

Similar to Please answer ASAP!!!Research Topic Ransomware attack on k-12 sch.pdf (20)

Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docxBotnet Research TemplateLearning ContentKey Botnet Notes.docx
Botnet Research TemplateLearning ContentKey Botnet Notes.docx
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
For the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justicFor the final assessment, you will imagine you are a criminal justic
For the final assessment, you will imagine you are a criminal justic
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdf
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Threat_intelligence_Handbook
Threat_intelligence_HandbookThreat_intelligence_Handbook
Threat_intelligence_Handbook
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
 

More from support58

Please show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdfPlease show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdfsupport58
 
Please show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdfPlease show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdfsupport58
 
Please help with the below 3 questions, the python script is at the.pdf
Please help with the below 3  questions, the python script is at the.pdfPlease help with the below 3  questions, the python script is at the.pdf
Please help with the below 3 questions, the python script is at the.pdfsupport58
 
please help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdfplease help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdfsupport58
 
Please help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdfPlease help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdfsupport58
 
Please create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdfPlease create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdfsupport58
 
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdfPlease complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdfsupport58
 
Plan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdfPlan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdfsupport58
 
Part 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdfPart 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdfsupport58
 

More from support58 (10)

Please show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdfPlease show me your output. Andrew Kelly has been employed by the We.pdf
Please show me your output. Andrew Kelly has been employed by the We.pdf
 
Please show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdfPlease show me how to do every part of this. Also could you show me .pdf
Please show me how to do every part of this. Also could you show me .pdf
 
Please help with the below 3 questions, the python script is at the.pdf
Please help with the below 3  questions, the python script is at the.pdfPlease help with the below 3  questions, the python script is at the.pdf
Please help with the below 3 questions, the python script is at the.pdf
 
please help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdfplease help! Carmen Company has the following projected costs for .pdf
please help! Carmen Company has the following projected costs for .pdf
 
Please help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdfPlease help will upvote. I have a heuristic function that outputs th.pdf
Please help will upvote. I have a heuristic function that outputs th.pdf
 
Please create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdfPlease create a simple flowchart of this programtell me the necess.pdf
Please create a simple flowchart of this programtell me the necess.pdf
 
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdfPlease complete ALL of the �TO DO�s in this code. I am really strugg.pdf
Please complete ALL of the �TO DO�s in this code. I am really strugg.pdf
 
Plan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdfPlan production for a four-month period (February through May). .pdf
Plan production for a four-month period (February through May). .pdf
 
Part I.pdf
Part I.pdfPart I.pdf
Part I.pdf
 
Part 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdfPart 1 During the most recent economic crisis in the state of Arizo.pdf
Part 1 During the most recent economic crisis in the state of Arizo.pdf
 

Recently uploaded

Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Recently uploaded (20)

Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Please answer ASAP!!!Research Topic Ransomware attack on k-12 sch.pdf

  • 1. Please answer ASAP!!! Research Topic: Ransomware attack on k-12 schools (2013-present) BLUF Statement: The persistent surge in ransomware attacks targeting K-12 schools underscores the urgent need for enhanced cybersecurity measures, as a failure to address this issue will likely lead to disruptions of education and compromised student data, endangering the future of our education system. Scope Note: This research paper will provide a comprehensive overview of ransomware attacks on K-12 schools to address the alarming rise in ransomware attacks from 2013 to present. The paper will focus on the frequency, vulnerabilities, evolving tactics, consequences, and significance of these attacks, as well as the need for proactive cybersecurity measures. It will not address ransomware incidents in other sectors or provide an extensive historical overview of ransomware. This work will build on previous research on ransomware attacks on K-12 schools, but it takes a new approach by focusing on five key points. The information will be current as of September 30, 2023. Based on the information, answer the following: Treat something about your chosen term paper assignment as a High Impact Low Probability (black swan) event. Think of your event and then think of what black swan event could come next (but has not happened, yet). You must: Define 2 pathways Identify 3 trigger points/changes in momentum for each of the 2 pathways Identify 2 observables for each of the 6 trigger points Identify 2 factors to deflect each of the 6 trigger points. Briefly explain everything! Examples of what your High Impact Low Probability event could be: the malicious actors behind your event committing a radically different TTP, such as hacktivists using multiple 0days in one attack or a ransomware gang switching to stealing files for espionage purposes; the TTP changes in a radical way, such as the ransomware actors suddenly switching back to opportunistic targeting with low ransoms against many victims; a new leak of information for a clearly different purposes, such as journalists receiving a large dump of files that
  • 2. expose ransomware gangs instead of political/financial crimes; or information that indicates country 1 was using denial and deception techniques to make it look like country 2 was behind your incident but it was really country 1 all along. High Impact Low Probability Analysis Highlights a seemingly unlikely event that would have major policy consequences if it happened. Use when its unlikely but would have substantial impact if it happened Use when there are concerns that policymakers and decision makers are ignoring the consequences of a potential event they should be concerned about Help uncover hidden relationships and key factors Identify oversights in the mainstream analytic line Periodic review helps counter prevailing mind-set errors High Impact Low Probability Analysis 1. Define the outcome (consequences) 2. Define pathways to the event as precisely as possible 3. Identify trigger points or changes in momentum 4. Identify key observables for each pathway 5. Identify factors to deflect the outcome/encourage a positive outcome Please answer right and well enough to get the point across. Please no plagiarism. Thank you!