Course Hero Logo

Discussion Modules 3 & 4.docx - For this assignment,...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 2 out of 4 pages.

For this assignment, research a recent cybersecurity issue that had a considerable impacton an enterprise.Describe in detail the recent cybersecurity issue that you selected.How was the enterprise impacted?What could have been done to prevent the incident?WannaCry is a ransomware that attacks infected computers, encrypts the data, anddemands a ransom to decrypt the data. WannaCry was a crypto viral extortion (ransomware)assault that swept across the globe like a flash of lightning in early 2017. It took over infectedPCs and encrypted the data stored in the Hard Drive Disk (HDD). After this, the ransomwaredemanded compensation in the form of Bitcoin to decrypt the data. It took advantage of aweakness in Microsoft’s Windows Operating System (WOS) using a code that was developedbehind closed doors by the National Security Agency (NSA) of the United States (U.S.). Theexploit was EternalBlue, and it was appropriated and disclosed by a hacking group namedShadow Brokers (Fruhlinger, 2018).This ransomware had multiple elements, which are a function that encrypts and thendecrypts the content on the users' PC. A TOR (The Onion Router) is software enabling onlineprivacy and files having encryption keys. It comes on contaminated PCs as a dropper, which is aself-supporting software package, and it isolates components of other applications that areembedded within it. Once WannaCry is launched, then it tries to access a hard-coded UniformResource Locator (URL), and if it fails to do so, then it moves on to searching for and encryptingthe files, causing them unavailable to the user (Fruhlinger, 2018). After this, a ransom notice is

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
Cryptography, Computer Security, Encryption, Attack, attack, Goliath

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture