SlideShare a Scribd company logo
1 of 1
Cryptographic technologies are used to keep our data private and secure.
However
Cryptographic technologies are used to keep our data private and secure. However,
cryptography is a double-edge sword in that threat actors can also use it to hide their
actions. Ransomware is a subset of malware in which the data on a victim’s computer is
locked, typically by encryption, and payment is demanded before the ransomed data is
decrypted and access returned to the victim. The motive for ransomware attacks is nearly
always monetary, and unlike other types of attacks, the victim is usually notified that an
exploit has occurred and is given instructions for how to recover from the attack. Payment
is often demanded in a virtual currency, such as bitcoin, so that the cybercriminal’s identity
isn’t known. (http://searchsecurity.techtarget.com/definition/ransomware)Research a
Ransomware attack. In your discussion include: victim of attack, vector of infection,
symptoms, variant of ransomware used, number of systems affected, cost of ransom (was it
paid?), were the systems recovered (from backup or decrypted), etc.? Do you agree with the
actions taken by the victim in response to the attack?

More Related Content

Similar to Cryptographic technologies are used to keep our data private and.docx

Ransomware_PDF
Ransomware_PDFRansomware_PDF
Ransomware_PDF
Ren Hao
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
IJNSA Journal
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 

Similar to Cryptographic technologies are used to keep our data private and.docx (20)

ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
Ransomware_PDF
Ransomware_PDFRansomware_PDF
Ransomware_PDF
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)
 
Communication security
Communication securityCommunication security
Communication security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 

More from write12

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
write12
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
write12
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
write12
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
write12
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
write12
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
write12
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
write12
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
write12
 

More from write12 (20)

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
 
social media.docx
social media.docxsocial media.docx
social media.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Cryptographic technologies are used to keep our data private and.docx

  • 1. Cryptographic technologies are used to keep our data private and secure. However Cryptographic technologies are used to keep our data private and secure. However, cryptography is a double-edge sword in that threat actors can also use it to hide their actions. Ransomware is a subset of malware in which the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motive for ransomware attacks is nearly always monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions for how to recover from the attack. Payment is often demanded in a virtual currency, such as bitcoin, so that the cybercriminal’s identity isn’t known. (http://searchsecurity.techtarget.com/definition/ransomware)Research a Ransomware attack. In your discussion include: victim of attack, vector of infection, symptoms, variant of ransomware used, number of systems affected, cost of ransom (was it paid?), were the systems recovered (from backup or decrypted), etc.? Do you agree with the actions taken by the victim in response to the attack?