InfoSecurity Assignment: 5. Ransomware: Extorting Businesses and ConsumersCover Page

InfoSecurity TechnologyWritten AssignmentIT 3506 – Infosecurity Technology Supervisor: Mr. Evan CheongWritten by : Terry, Kum Qi Xun 155116UDate:   16 November 2017TABLE OF CONTENTInfoSecurity Technology Written Assignment: 5. Ransomware: Extorting Businesses and ConsumersCover Page ………………………………………………………………………………………………………………… 1Table of Contents ……………………………………………………………………………………………………….. 2Executive Summary …………………………………………………………………………………………………… 3 Main Content …………………………………………………………………………………………………………. 4Description of Threat ………………………………………………………………………………………….. 4Nature of Threat ……………………………………………………………………………………………. 4 Mitigation of Threat …………………………………………………………………………….. 4References to books and/or websites …………………………………………………………………………. 5 Executive Summaryhttps://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economyhttps://learn.nyp.edu.sg/bbcswebdav/pid-2573801-dt-content-rid-9983291_1/courses/2017S2-IT3506/Symantec_InternetSecurityThreatReport_Vol22_Apr2017.pdf Main ContentDescription of ThreatRansomware is a malicious software that is used to block file access on a computer system and extorts a sum of money from the user before allowing access to the computer. Cybercriminals usually utilizes these ransomware software on a massive scale with the intention of making money off innocent users and businesses that are susceptible to these attacks.Nature of ThreatIn reference to symantec, these ransomware families are generally categorized under two basic types which are most commonly circulated. The most common types of ransomware is known as a “Crypto Ransomware”, designed to encrypt personal files and data. The other is known as a “Locker Ransomware”, designed to lock the entire computer system to completely prevent any access to the computer system. These malicious software usually infiltrates the computer system as a worm or trojan, most commonly through clicking on infected email links or visiting malicious websites. It can also take advantage of security vulnerabilities such as outdated windows systems and spread across networks to infect the computer system.Mitigation of ThreatPatch systemHave updated anti virusPrevent clicking malicious contentDo not pay ransom Referenceshttps://www.symantec.com/blogs/threat-intelligence/wannacry-ransomware-attackhttps://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.htmlhttps://www.webopedia.com/TERM/R/ransomware.htmlhttps://blog.emsisoft.com/2017/08/15/ransomware-payment-methods/https://www.trendmicro.com/vinfo/us/security/definition/ransomwarehttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-evolution-of-ransomware.pdf