SlideShare a Scribd company logo
1 of 1
Cryptographic technologies are used to keep our data private and secure.
However
Cryptographic technologies are used to keep our data private and secure. However,
cryptography is a double-edge sword in that threat actors can also use it to hide their
actions. Ransomware is a subset of malware in which the data on a victim’s computer is
locked, typically by encryption, and payment is demanded before the ransomed data is
decrypted and access returned to the victim. The motive for ransomware attacks is nearly
always monetary, and unlike other types of attacks, the victim is usually notified that an
exploit has occurred and is given instructions for how to recover from the attack. Payment
is often demanded in a virtual currency, such as bitcoin, so that the cybercriminal’s identity
isn’t known. (http://searchsecurity.techtarget.com/definition/ransomware)Research a
Ransomware attack. In your discussion include: victim of attack, vector of infection,
symptoms, variant of ransomware used, number of systems affected, cost of ransom (was it
paid?), were the systems recovered (from backup or decrypted), etc.? Do you agree with the
actions taken by the victim in response to the attack?

More Related Content

Similar to Cryptographic technologies are used to keep our data private and.docx

Ransomware_PDF
Ransomware_PDFRansomware_PDF
Ransomware_PDF
Ren Hao
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
IJNSA Journal
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 

Similar to Cryptographic technologies are used to keep our data private and.docx (20)

ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
Ransomware_PDF
Ransomware_PDFRansomware_PDF
Ransomware_PDF
 
Cryptolocker Ransomware Attack
Cryptolocker Ransomware AttackCryptolocker Ransomware Attack
Cryptolocker Ransomware Attack
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)Common Cyberthreats and How to Prevent Them (2019)
Common Cyberthreats and How to Prevent Them (2019)
 
Communication security
Communication securityCommunication security
Communication security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 

More from write12

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
write12
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
write12
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
write12
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
write12
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
write12
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
write12
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
write12
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
write12
 

More from write12 (20)

Social What directed your interest to this.docx
Social What directed your interest to this.docxSocial What directed your interest to this.docx
Social What directed your interest to this.docx
 
Soap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docxSoap notes will be uploaded to Moodle and put through.docx
Soap notes will be uploaded to Moodle and put through.docx
 
Social Poverty.docx
Social Poverty.docxSocial Poverty.docx
Social Poverty.docx
 
Soap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docxSoap Note Diabetes Mellitus.docx
Soap Note Diabetes Mellitus.docx
 
Social Disorganization.docx
Social Disorganization.docxSocial Disorganization.docx
Social Disorganization.docx
 
SOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docxSOC101 Assignment Sheet Interview.docx
SOC101 Assignment Sheet Interview.docx
 
Slide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docxSlide 1 Title Page Slide 2 3.docx
Slide 1 Title Page Slide 2 3.docx
 
Social media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docxSocial media sites have recently drew decision attention and influenced.docx
Social media sites have recently drew decision attention and influenced.docx
 
Smart Desk For Elderly.docx
Smart Desk For Elderly.docxSmart Desk For Elderly.docx
Smart Desk For Elderly.docx
 
Social cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docxSocial cognition is the mental activity relating to social.docx
Social cognition is the mental activity relating to social.docx
 
Social Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docxSocial Context Ethics Prior to beginning work on the.docx
Social Context Ethics Prior to beginning work on the.docx
 
Sketching a Process flow diagram.docx
Sketching a Process flow diagram.docxSketching a Process flow diagram.docx
Sketching a Process flow diagram.docx
 
Sixth Century Course SX3504.docx
Sixth Century Course SX3504.docxSixth Century Course SX3504.docx
Sixth Century Course SX3504.docx
 
Social media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docxSocial media and its data are both a challenge and.docx
Social media and its data are both a challenge and.docx
 
Social Media and.docx
Social Media and.docxSocial Media and.docx
Social Media and.docx
 
Social Psychology of Prosocial.docx
Social Psychology of Prosocial.docxSocial Psychology of Prosocial.docx
Social Psychology of Prosocial.docx
 
Social media for.docx
Social media for.docxSocial media for.docx
Social media for.docx
 
Sleep report.docx
Sleep report.docxSleep report.docx
Sleep report.docx
 
Social Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docxSocial Media and Consumer Behavior.docx
Social Media and Consumer Behavior.docx
 
social media.docx
social media.docxsocial media.docx
social media.docx
 

Recently uploaded

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Cryptographic technologies are used to keep our data private and.docx

  • 1. Cryptographic technologies are used to keep our data private and secure. However Cryptographic technologies are used to keep our data private and secure. However, cryptography is a double-edge sword in that threat actors can also use it to hide their actions. Ransomware is a subset of malware in which the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim. The motive for ransomware attacks is nearly always monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions for how to recover from the attack. Payment is often demanded in a virtual currency, such as bitcoin, so that the cybercriminal’s identity isn’t known. (http://searchsecurity.techtarget.com/definition/ransomware)Research a Ransomware attack. In your discussion include: victim of attack, vector of infection, symptoms, variant of ransomware used, number of systems affected, cost of ransom (was it paid?), were the systems recovered (from backup or decrypted), etc.? Do you agree with the actions taken by the victim in response to the attack?