Ransomware attack.pptx - Ransomware attack Introduction Ransomware is a type of virus or attack in which a single persons access to computer system is

Ransomware attack.pptx - Ransomware attack Introduction...

This preview shows page 1 out of 9 pages.

You've reached the end of your free preview.

Want to read all 9 pages?

Unformatted text preview: Ransomware attack Introduction Ransomware is a type of virus or attack in which a single persons access to computer system is blocked up to the time that ransom is paid to the attacker Usually these attacks are on individuals but the attackers can also target large scale organizations. The threat of ransomware attacks is increasing on the internet These attacks are spread by downloading a file, data or clicking on some random advertisements which contains this malware Cont.… The attackers use different type of ways to spread ransomware These attacks can perform multiple types of impact on organizations and users The data which might be recovered through help would also not guarantee 100% back up and high quality Computers which suffer with ransomware attack have blocked access to their data and information, encryption of their data and data lost Impact of ransomware attack Ransomware attacks are damaging and have a negative influence on the company or individual as it could result in permanent loss of important data The only way to get access to your data is paying the ransom to the attacker It can affect reputation of the company Affect operations of the company Impact on the revenues of the company Cont.… Increase financial loss for a company Can be highly damaging for hospitals as the lives of patients can be affected Trust and confidence on the company of customers can be damaged Lost of data in case of recovery as well Data There are multiple types of messages which are displayed when a system has been targeted with ransomware attacks You cannot access to the file, your file is encrypted, your screen has been blocked are some of the most common messages displayed on screens Solution Users should be provided with awareness and training Proper firewalls should be installed in the computer systems Safe scrolling should be done Antivirus should be installed in the computers Cont.… Secure email gateways should be installed Untrusted and malicious emails should not be opened Untrusted advertisement links should not be opened Mobile devices should be protected through mobile management tools Regular backup should be performed Thank You! ...
View Full Document

  • Spring '13

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors