Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Education On Securities For Home Computers

tag 0 Download7 Pages 1,542 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
Discuss about the Education On Security For Home Computers.

 

Answer:

Introduction to ransomware malware

Cyber-attacks have perverted in the last years, nasty form known as ‘ransomware ‘been introduced. The criminals do not hide that they have hacked a user’s system, rather they come in form of an extortion and just lock some out of the system. They then threaten the owner to expose the data to the world or even destroy the data totally. The recovery from the attack involves some embarrassments about the vulnerabilities of corporate been exposed or some security alerts. It actually came up as a result of education improvement and the users of computers and those work in the antivirus companies as well as the professionals in computer security. The removing of ransomware it’s actually a business and there is actually need to have a company which is professional and the one that normal operations go back to securely. Currently the authors of ransomware improve the programs of file encryption daily and infections to android and big organizations making it hard to avoid.

The impact of ransomware on the society

The nuisance nature of ransomware since people are in risk of loss of important data, even when the infected computers still can be in use this really has an impact on productivity.[1]

  1. Variants of ransomware

Crypto Locker

Spam messages were used in spread of the malware where it used to the files of a user by a public key encryption known as the RSA. And demand someone to pay in order to get the decryption key. The software was brought down by Tovar operation by bringing down its controlling botnet. The operation was able to discover the private keys which were used for encryption of the files

Tesla Crypt

The is a malware which rose a year after the Crypto Locker and was claimed to be one of its variants, and Targets mostly the video games. For its encryption uses the AES algorithm. Its distributions are specifically through a kit know as Angler and attacks the vulnerabilities of adobe. After the exploitation of the vulnerability the malware it installs itself in the temp folder of Microsoft.

 

Torrent Locker

 Is a kind of malicious software spread by spam campaigns in the email and mainly targets the messages delivered through email to a certain place.in encrypting its files it uses the AES algorithm. The malware collects the addresses associated with the email from the affected book of addresses and spread the malicious software beyond computer which is initially infected.

  1. wanna cry

It is a malware that has attacked over 125000 organizations in over than 150 countries. After Microsoft implementation of the SMB rule and releasing a patch for the defect many did not install it where wannacry saw this as a hole and took advantage. It spread across on the networked devices because for more infection no user interaction is required.[2]

bad rabbit

It is a malware spread by an update on adobe flash which is really fake on the websites which are compromised. It has affected many organizations in Eastern Europe.

Working mechanism of ransomware

It’s a malicious software in a computer that locks up user’s files and have to be unlocked by use of a key from attackers who force you to pay some huge amount of money in order for you to get the key

1.After the malware landing on your computer through a download or an attachment on an email which is dangerous. The malicious software attacks the fault in the operating system and runs on your machine a code which is harmful. It focuses on the backup files on the system of the victim and detach them to avoid the backup restoration  

Your personal files are encrypted by ransomware, by mixing up the contents

such in a way that they are unreadable and denies to give the encryption undo key.

3 The attacker’s insistence for a payment through an online currency which is anonymous known as Bitcoin, and its users are identifiable through some code known as “Bitcoin addresses”

  1. Potential threats posed by ransomware
  • There is some fear by the victims of losing their files
  • They also experience some financial loss for the payments made to the ransom[3]
  • There is also productivity loss
  • There are some costs in IT and legal fees
  • There are some modifications in the networks
  1. The recent attack
  2. The huge data breaches-it was a cyberattack in the year 2017 on a reporting agency known as the “Equifax credit”, which involved the theft of dates of birth, numbers of social security and other data mostly about the U.S. population and this was a clear evidence that attackers when they target they think big. In 2018 most companies especially that hold more of information which is sensitive are on their sights
  3. Mining cryptocurrencies

This are the attackers reportedly from North Korea, who targeted the owner’s digital currencies such as Bitcoin. It also involved the stealing of the processing power of a computer. The hacking of public WI-FI in Argentina a place known as Starbucks and hacking of computers at oil pipeline company in Russia are the recent cases.

  1. In May 2017 there was the major cyber attacker. The wannaCry ransomware stormed through the web with main effect being in Europe whereby it caused a damage in windows. 200,000 computers were affected within the first few hours. It affected large organizations such as Renault and NHS.
  2. There are also some other viruses known as the “External Blue” which was developed in US. It infected silently some computers in Ukraine after the downloading of a certain tax package which was popular by some certain users. Someone’s computer is free zed until a certain amount of “$US300” is paid in form of a bitcoin[4]
  3. Mitigation tools
  4.  recommend the use of antivirus that are paid for and includes and automatic updating of its modules

2.recommend users to understand ‘the traffic-filtering solution’, its importance as it can give anti-ransomware protection

3.Suspending the malicious process this involves the temporal stoppage of a process that can be malicious and some analysis either manually or automatically. You can either ask for the decision of the user by ensuring that there is no any harm caused by the process until the user’s action is taken.[5]

4.recommend to use whitelisting software -this expounds what is supposed to run on any computer other than just blocking of the malicious process which are known. This keeps track of big amounts of viruses which are modified slightly

5.recommend the use of networking segmentation which it pursues the protection of infrastructure in the IT sector of the organization by looking at the scope of resources which can be accessed by the cyber intruders.[6]

The Ransom Free is an example of process suspension. Importance of killing the process it ensures that there is right away stoppage of the malicious process

  1. summary

Ransomware is a malware that takes hostage for files and demand a payment for their release, mainly targeting corporations, individuals and most organizations such as schools and hospitals The malware also has some errors that makes it less effective. Some of the errors include kills Switch which are unintended, and failure to remove from memory the keys of decryption

It a role for all the business –owners, the makers of decision, users to disrupt ransomware because it has caused blackmailing to a global scale. There are really a lot of many simple things we can do to mitigate this malicious software because we are not actually powerless. The cyber criminals have influence on one’s information and one’s security as given to them. Most of these criminals’ big states hire them not to only target on financial objectives but also strategic interests.

Users should have some software’s that detects ransomware but not just only the detections of signatures. Examples of the soft wares include” Emsisoft Anti-Malware “has some detection behavior that curbs if not all but most of ransomware infections from affecting the computer.

Also users should make use of certain basic computer practices   which are very important in most cases. These practices include

  • Backing up personal data
  • Failure to open of attachment without clear information about their source
  • Scanning of attachments with some tools like the “Virus Total”
  • Making sure that users operating system is up to date
  • Use of passwords which are hard and never use similar password for multiples accounts
 

References

[1] G. L. White, “Education and prevention relationships on security incidents for home computers,” J. Comput. Inf. Syst., vol. 55, no. 3, pp. 29–37, 2015.

[2] S. Thakkar, “Ransomware-Exploring the Electronic form of Extortion,” Int. J. Sci. Res. Dev., pp. 123–125, 2014.

[3] A. Bhardwaj, “Ransomware: A rising threat of new age digital extortion,” in Online Banking Security Measures and Data Protection, IGI Global, 2017, pp. 189–221.

[4] J. Wyke and A. Ajjan, “The current state of ransomware,” SophosLabs Tech. Pap., 2015.

[5] E. Pazik, “Ransomware: Attack Vectors, Mitigation and Recovery,” Utica College, 2017.

[6] R. Richardson and M. North, “Ransomware: Evolution, mitigation and prevention,” Int. Manag. Rev., vol. 13, no. 1, pp. 10–21, 2017.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Education On Securities For Home Computers. Retrieved from https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers.

"Education On Securities For Home Computers." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers.

My Assignment Help (2019) Education On Securities For Home Computers [Online]. Available from: https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers
[Accessed 06 December 2019].

My Assignment Help. 'Education On Securities For Home Computers' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers> accessed 06 December 2019.

My Assignment Help. Education On Securities For Home Computers [Internet]. My Assignment Help. 2019 [cited 06 December 2019]. Available from: https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers.


MyAssignmenthelp.com is one of the cheap essay writing service that provides top quality essays. We provide essays on almost every topic on any subject or domain. We provide you with descriptive essay topics/, informative speech essay topics, persuasive speech topics for college students,reflective essay topics and many more along with well-crafted essays on each topic.Getting online essay help becomes a peace of cake with MyAssignmenthelp.com.We also provide tips from time to time to help you ace the art of essay writing. Once you have mastered with us how to write an essay fast, you can draft on your own. Connect with us today.

Latest Networking Samples

BN305 Virtual Private Network 2

Download : 0 | Pages : 6

Answer: Introduction After a detailed investigation of the infrastructure of the organization and identification of the needs of the network the report is prepared. The current needs of the organization is to establish a VPN connection between remote sites of the same organization and securely transmission of the data packets in the network. The success of the development of the network depends on the successful implementation of the VPN. The V...

Read More arrow

CITS5502 Software Processes

Download : 0 | Pages : 4
  • Course Code: CITS5502
  • University: University Of Western Australia
  • Country: Australia

Answer: Introduction: In this task the main objective is to perform task 1 and task 2 to have an insight about the time needed to write problems in different languages when written repeatedly. In particular at first 7 random students’ required time to write problem 1 in language A and B and problem 2 in language A is selected from a total of 14 students’ data. Then the average time is calculated for each attempt for the three task...

Read More arrow

MN621 Advanced Network Design1

Download : 0 | Pages : 5

Answer: Part 1 Set of Questionaries’ for gathering of requirement from various users What kind of software application are needed to be installed in the given workstation? How many users are needed for building a group and creating a proper network access? What are kind of network device and hardware needed for establishing proper kind of communication between several LAN in the given network? What are the present constraint encou...

Read More arrow Tags: Australia Melbourne Management University of Melbourne 

ICT703 Network Technology And Management

Download : 0 | Pages : 13

Answer: Introduction Every business requires a platform that will enable it to communicate and share resources. Having a good network design and infrastructure will enable the company to meet these objectives. A network increases company productivity by enhancing business processes though automation and resource sharing (Pop, 2012). Over the year, network technology has evolved to meet the ever-changing business operations that are become com...

Read More arrow

COIT20262 Advanced Network Security2

Download : 0 | Pages : 7

Answer: Introduction: The task here refers to authenticating and controlling the access for the small enterprise, which contains nearly forty employees, in a years. The employees are categorized with the following roles such as, Graphic design, IT administration, web development, finance, CEO, software engineering, human resources, executive group and, sales and marketing. Also multiple roles are taken by the employees, where the employees mi...

Read More arrow Tags: Australia Mortdale Management University of New South Wales 
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,157,348

Orders

4.9/5

Overall Rating

5,050

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

thanks to the expert for your hard work i've received good mark and good feedback as well cheers!

flag

User Id: 323943 - 06 Dec 2019

Australia

student rating student rating student rating student rating student rating

Paper was spot on, got a great grade and helped boost my over all grade for the semester. Was the boost I needed to get back up to A

flag

User Id: 350197 - 06 Dec 2019

Australia

student rating student rating student rating student rating student rating

I was very happy with my report it was detailed and covered the topic flawlessly

flag

User Id: 350197 - 06 Dec 2019

Australia

student rating student rating student rating student rating student rating

I’m impressed with your ability to write concisely. Not only did you fulfill the assignment, you also wrote a long-ish intro and answered questions that went beyond the prompt. Doing so within the word limit and doing it well deserves recognition. ...

flag

User Id: 282728 - 06 Dec 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?