country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Education On Securities For Home Computers

tag 0 Download7 Pages / 1,542 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
Discuss about the Education On Security For Home Computers.

 

Answer:

Introduction to ransomware malware

Cyber-attacks have perverted in the last years, nasty form known as ‘ransomware ‘been introduced. The criminals do not hide that they have hacked a user’s system, rather they come in form of an extortion and just lock some out of the system. They then threaten the owner to expose the data to the world or even destroy the data totally. The recovery from the attack involves some embarrassments about the vulnerabilities of corporate been exposed or some security alerts. It actually came up as a result of education improvement and the users of computers and those work in the antivirus companies as well as the professionals in computer security. The removing of ransomware it’s actually a business and there is actually need to have a company which is professional and the one that normal operations go back to securely. Currently the authors of ransomware improve the programs of file encryption daily and infections to android and big organizations making it hard to avoid.

The impact of ransomware on the society

The nuisance nature of ransomware since people are in risk of loss of important data, even when the infected computers still can be in use this really has an impact on productivity.[1]

  1. Variants of ransomware

Crypto Locker

Spam messages were used in spread of the malware where it used to the files of a user by a public key encryption known as the RSA. And demand someone to pay in order to get the decryption key. The software was brought down by Tovar operation by bringing down its controlling botnet. The operation was able to discover the private keys which were used for encryption of the files

Tesla Crypt

The is a malware which rose a year after the Crypto Locker and was claimed to be one of its variants, and Targets mostly the video games. For its encryption uses the AES algorithm. Its distributions are specifically through a kit know as Angler and attacks the vulnerabilities of adobe. After the exploitation of the vulnerability the malware it installs itself in the temp folder of Microsoft.

 

Torrent Locker

 Is a kind of malicious software spread by spam campaigns in the email and mainly targets the messages delivered through email to a certain place.in encrypting its files it uses the AES algorithm. The malware collects the addresses associated with the email from the affected book of addresses and spread the malicious software beyond computer which is initially infected.

  1. wanna cry

It is a malware that has attacked over 125000 organizations in over than 150 countries. After Microsoft implementation of the SMB rule and releasing a patch for the defect many did not install it where wannacry saw this as a hole and took advantage. It spread across on the networked devices because for more infection no user interaction is required.[2]

bad rabbit

It is a malware spread by an update on adobe flash which is really fake on the websites which are compromised. It has affected many organizations in Eastern Europe.

Working mechanism of ransomware

It’s a malicious software in a computer that locks up user’s files and have to be unlocked by use of a key from attackers who force you to pay some huge amount of money in order for you to get the key

1.After the malware landing on your computer through a download or an attachment on an email which is dangerous. The malicious software attacks the fault in the operating system and runs on your machine a code which is harmful. It focuses on the backup files on the system of the victim and detach them to avoid the backup restoration  

Your personal files are encrypted by ransomware, by mixing up the contents

such in a way that they are unreadable and denies to give the encryption undo key.

3 The attacker’s insistence for a payment through an online currency which is anonymous known as Bitcoin, and its users are identifiable through some code known as “Bitcoin addresses”

  1. Potential threats posed by ransomware
  • There is some fear by the victims of losing their files
  • They also experience some financial loss for the payments made to the ransom[3]
  • There is also productivity loss
  • There are some costs in IT and legal fees
  • There are some modifications in the networks
  1. The recent attack
  2. The huge data breaches-it was a cyberattack in the year 2017 on a reporting agency known as the “Equifax credit”, which involved the theft of dates of birth, numbers of social security and other data mostly about the U.S. population and this was a clear evidence that attackers when they target they think big. In 2018 most companies especially that hold more of information which is sensitive are on their sights
  3. Mining cryptocurrencies

This are the attackers reportedly from North Korea, who targeted the owner’s digital currencies such as Bitcoin. It also involved the stealing of the processing power of a computer. The hacking of public WI-FI in Argentina a place known as Starbucks and hacking of computers at oil pipeline company in Russia are the recent cases.

  1. In May 2017 there was the major cyber attacker. The wannaCry ransomware stormed through the web with main effect being in Europe whereby it caused a damage in windows. 200,000 computers were affected within the first few hours. It affected large organizations such as Renault and NHS.
  2. There are also some other viruses known as the “External Blue” which was developed in US. It infected silently some computers in Ukraine after the downloading of a certain tax package which was popular by some certain users. Someone’s computer is free zed until a certain amount of “$US300” is paid in form of a bitcoin[4]
  3. Mitigation tools
  4.  recommend the use of antivirus that are paid for and includes and automatic updating of its modules

2.recommend users to understand ‘the traffic-filtering solution’, its importance as it can give anti-ransomware protection

3.Suspending the malicious process this involves the temporal stoppage of a process that can be malicious and some analysis either manually or automatically. You can either ask for the decision of the user by ensuring that there is no any harm caused by the process until the user’s action is taken.[5]

4.recommend to use whitelisting software -this expounds what is supposed to run on any computer other than just blocking of the malicious process which are known. This keeps track of big amounts of viruses which are modified slightly

5.recommend the use of networking segmentation which it pursues the protection of infrastructure in the IT sector of the organization by looking at the scope of resources which can be accessed by the cyber intruders.[6]

The Ransom Free is an example of process suspension. Importance of killing the process it ensures that there is right away stoppage of the malicious process

  1. summary

Ransomware is a malware that takes hostage for files and demand a payment for their release, mainly targeting corporations, individuals and most organizations such as schools and hospitals The malware also has some errors that makes it less effective. Some of the errors include kills Switch which are unintended, and failure to remove from memory the keys of decryption

It a role for all the business –owners, the makers of decision, users to disrupt ransomware because it has caused blackmailing to a global scale. There are really a lot of many simple things we can do to mitigate this malicious software because we are not actually powerless. The cyber criminals have influence on one’s information and one’s security as given to them. Most of these criminals’ big states hire them not to only target on financial objectives but also strategic interests.

Users should have some software’s that detects ransomware but not just only the detections of signatures. Examples of the soft wares include” Emsisoft Anti-Malware “has some detection behavior that curbs if not all but most of ransomware infections from affecting the computer.

Also users should make use of certain basic computer practices   which are very important in most cases. These practices include

  • Backing up personal data
  • Failure to open of attachment without clear information about their source
  • Scanning of attachments with some tools like the “Virus Total”
  • Making sure that users operating system is up to date
  • Use of passwords which are hard and never use similar password for multiples accounts
 

References

[1] G. L. White, “Education and prevention relationships on security incidents for home computers,” J. Comput. Inf. Syst., vol. 55, no. 3, pp. 29–37, 2015.

[2] S. Thakkar, “Ransomware-Exploring the Electronic form of Extortion,” Int. J. Sci. Res. Dev., pp. 123–125, 2014.

[3] A. Bhardwaj, “Ransomware: A rising threat of new age digital extortion,” in Online Banking Security Measures and Data Protection, IGI Global, 2017, pp. 189–221.

[4] J. Wyke and A. Ajjan, “The current state of ransomware,” SophosLabs Tech. Pap., 2015.

[5] E. Pazik, “Ransomware: Attack Vectors, Mitigation and Recovery,” Utica College, 2017.

[6] R. Richardson and M. North, “Ransomware: Evolution, mitigation and prevention,” Int. Manag. Rev., vol. 13, no. 1, pp. 10–21, 2017.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Education On Securities For Home Computers. Retrieved from https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers.

"Education On Securities For Home Computers." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers.

My Assignment Help (2019) Education On Securities For Home Computers [Online]. Available from: https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers
[Accessed 14 July 2020].

My Assignment Help. 'Education On Securities For Home Computers' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers> accessed 14 July 2020.

My Assignment Help. Education On Securities For Home Computers [Internet]. My Assignment Help. 2019 [cited 14 July 2020]. Available from: https://myassignmenthelp.com/free-samples/education-on-securities-for-home-computers.


MyAssignmenthelp.com is one of the cheap essay writing service that provides top quality essays. We provide essays on almost every topic on any subject or domain. We provide you with descriptive essay topics/, informative speech essay topics, persuasive speech topics for college students,reflective essay topics and many more along with well-crafted essays on each topic.Getting online essay help becomes a peace of cake with MyAssignmenthelp.com.We also provide tips from time to time to help you ace the art of essay writing. Once you have mastered with us how to write an essay fast, you can draft on your own. Connect with us today.

Latest Networking Samples

CO4509 Computer Security Assignment

Download : 0 | Pages : 14
  • Course Code: CO4509
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction: Computer security is a major concern for every organisation and most importantly to safe guard the data stored on the system from any loss. It is important to secure the information from data loss or inception of viruses or malware in the system. Security completely deals with securing the data stored on the network from any unauthorized loss. Every organisation is dependent on computer for performing certain tasks thus ...

Read More arrow

HS1011 Data Communication And Networks Methodology

Download : 0 | Pages : 5
  • Course Code: HS1011
  • University: Victoria University
  • Country: Australia

Answer: Introduction The given three scenario are analyzed for the selection of the network management tool. With the increase in the complexity of the network it is crucial to select a robust network monitoring solution and thus the Manage Engine network monitoring tool is selected for analyzing the data flow in the network. It can be used for monitoring the network activities and get the status of each of the network devices connected with ...

Read More arrow

CS2S562 Secure Software Development

Download : 0 | Pages : 2

Answer: Introduction: Internet of things is simply network of  any physical computing devices. The IoT devices are used literary in day to day activities. So many devices are constructed emulating the internet of things.  Since there are so many devices of internet of things, i simulated a home automation system using C sharp programming language, visual studio 2015 IDE. From the requirement of the console system application of th...

Read More arrow

COIT20261 Network Routing And Switching 2

Download : 0 | Pages : 4

Answer: A 1: a)                           b)                   c)   Here /27 is the subnet mask, ie) 255.255.255.224   Binary Format of Given Address is,   154.78.177.3         --->10011010.01001110.10110001.000 00011   2...

Read More arrow

CI7130 Network And Information Security

Download : 0 | Pages : 13
  • Course Code: CI7130
  • University: Kingston University London
  • Country: United Kingdom

Answer: Introduction: The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,361,360

Orders

4.9/5

Overall Rating

5,081

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

3076 Order Completed

99% Response Time

Emily Wei

Doctor of Philosophy (Ph.D) in Civil Engineering

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2279 Order Completed

97% Response Time

Zachary Perez

PhD in Computer Science and Information System

Washington, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

I will have to say that my pharmacology assignment was not well written at all. There were so many grammatical errors and it was too basic I could have done it myself. I basically had to rewrite the whole essay due to the basic statements in the writ...

flag

User Id: 433972 - 14 Jul 2020

Australia

student rating student rating student rating student rating student rating

I loved it! Thank you! You were a life saver when I had a family emergency limiting my ability to study.

flag

User Id: 417901 - 14 Jul 2020

Australia

student rating student rating student rating student rating student rating

thank you so much for giving me the solutions very quickly. I am really satisfied with the enthusiastic support from assistant help and all services in here.

flag

User Id: 439815 - 13 Jul 2020

Australia

student rating student rating student rating student rating student rating

great job i received 94.75% very quick response to corrections i requested. i was very pleased

flag

User Id: 377488 - 13 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?