In this assignment, you will
To help your peers to understand more about the incident, you also provide information about the victim, the time and location, the possible or identified cause of the incident, and any reported loss and damage. You then provide some insight about the cause of the incident such as the type of the security attack, the method of the attack, and possible damage the attack may bring.
You will justify the need for managing security of digital information and information systems by discussing the consequences the security incidents may bring to their victims, to you and the society. Where possible, use the peer sharing information as source for support your argument.
According to Mohurle and Patil 2017, ransomware virus software is one of the most significant and vulnerable software that is being used by the attackers for spreading vulnerabilities. This type of virus is the malicious software, which threatens for publishing the confidential data or perpetually blocking the access to that data, until and unless a specific ransom is being paid. The WannaCry Ransomware attack occurred in May 2017 by a ransomware cryptoworm, known as WannaCry worm. The threat was spread throughout the world. The several systems, which were running the operating system of Microsoft Windows, were targeted in the attack.
As per Mattei 2017, the privacy, confidentiality and security of the digital information as well as information systems for the WannaCry ransomware attack is extremely important and significant. The ransomware affected more than 200000 computers in about 150 countries. The security and confidentiality of these computers were highly required for preventing the access of the sensitive information and data. This WannaCry ransomware took advantage of the inherent vulnerability of the Microsoft Windows. Although the overall patch was free for the users, who are running the Windows versions, extra payment was required for excess security. Moreover, this type of information systems should also have end users’ security.
Yaqoob et al. 2017 state that, the increase of usages of smart phones, sensors and computers had led to the vulnerable attack of WannaCry ransomware. The major security concerns of this attack are being checked after this attack took place. The security awareness was extremely important for raising the total information security or information systems’ security. This helped in ensuring security as well as privacy issues that were common for the organization that had faced WannaCry ransomware attack. The next requirement of the information system security is that innovation is eventually supported by this method. A proper security strategy is required for this purpose and hence freedom is enabled for using the new technologies.
According to Thomas and Galligher 2018, the backup systems are to be evaluated within the information security risk assessments for combating ransomware. For the WannaCry ransomware attack, most of the information systems did not have the ability for backup systems and hence the organizations or victims were not at all prepared. Thus, the attackers were able to exploit all types of sensitive data or information. The information security risk assessment is the significant procedure for performing the objective analysis of the efficiency and effectiveness of the security controls of the organization. This would be helpful for the protection of several assets and then determination of the loss, which is to be incurred for those specific assets.
Therefore, from the above critical analysis, it could be concluded that the requirement of the security management is extremely important for the digital information as well as the information system. The most basic methods of this security management are extraction of data, synthesizing the data and utilizing the scoping review for conducting the field mapping. Furthermore, innovation and data protection are enhanced by this technique. The interoperability and integration are also supported for the information security, compliance management and privacy. The WannaCry ransomware attack had substantially proved that there is a requirement of better security management for controlling the various risks and threats.
Reducing Impact of Ransomware: The overall impact of the WannaCry Ransomware could have been reduced to a greater level by including various cyber security methods. These are given below:
iii) Restriction of Administrative Rights: The significant administrative rights should be eventually restricted so that the unauthorized users do not get any hold of the data (Zimba, Simukonda and Chishimba 2017).
Personal Experience: I had once faced similar situation for ransomware attack in my school. One of the attackers had acquired the passwords of the computer systems’ in our school and then demanded for ransom from the school authorities. These computer systems consisted of all the confidential and sensitive data that were not to be exploited under any circumstances. A proper risk management was present for reducing the information security threats and vulnerabilities, however, our school’s systems were not protected with top rated antivirus and firewalls. Hence, this ransomware took place. However, with the timely involvement of two cyber security experts, we were able to stop the threat from spreading any further and thus our systems were protected.
Mattei, T.A., 2017. Privacy, Confidentiality, and Security of Health Care Information: Lessons from the Recent WannaCry Cyberattack. World neurosurgery, 104, pp.972-974.
Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5).
Thomas, J. and Galligher, G., 2018. Improving backup system evaluations in information security risk assessments to combat ransomware.
Thomas, J., 2018. Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks.
Yaqoob, I., Ahmed, E., ur Rehman, M.H., Ahmed, A.I.A., Al-garadi, M.A., Imran, M. and Guizani, M., 2017. The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks, 129, pp.444-458.
Zimba, A., Simukonda, L. and Chishimba, M., 2017. Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security. Zambia ICT Journal, 1(1), pp.35-40.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). MGMT2200 Critical Thinking And Analysis. Retrieved from https://myassignmenthelp.com/free-samples/mgmt-2200-critical-thinking-and-analysis/information-systems-in-wannacry-ransomware-attack.html.
"MGMT2200 Critical Thinking And Analysis." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/mgmt-2200-critical-thinking-and-analysis/information-systems-in-wannacry-ransomware-attack.html.
My Assignment Help (2020) MGMT2200 Critical Thinking And Analysis [Online]. Available from: https://myassignmenthelp.com/free-samples/mgmt-2200-critical-thinking-and-analysis/information-systems-in-wannacry-ransomware-attack.html
[Accessed 27 January 2021].
My Assignment Help. 'MGMT2200 Critical Thinking And Analysis' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/mgmt-2200-critical-thinking-and-analysis/information-systems-in-wannacry-ransomware-attack.html> accessed 27 January 2021.
My Assignment Help. MGMT2200 Critical Thinking And Analysis [Internet]. My Assignment Help. 2020 [cited 27 January 2021]. Available from: https://myassignmenthelp.com/free-samples/mgmt-2200-critical-thinking-and-analysis/information-systems-in-wannacry-ransomware-attack.html.
At MyAssignmenthelp.com, we understand that when students get stuck with tough assignments, they look for affordable services. To assist students with complex assignments, we have built a team of skilled cheap essay writers. MyAssignmenthelp.com has become one stop solution for all students who often look for answers related to their search similar to do my essay at the cheap rate or who can write my essay at affordable prices. Students prefer hiring us as we have the best provisions to render services related to do my essay online at a reasonable rate.
Answer: In the modern stressful environment, different mood disorders are common leading to a major issue in behavioral patterns of individuals. Depression is a disorder which is tough to diagnose as it has no physical symptoms apart from a few behavioral changes (Segal, Williams and Teasdale 2018). Therefore it is normally assumed that a person suffers from depression if they lose interest in their daily life and routine for two weeks having ...
Read MoreAnswer: Culture can be described as the lifeblood of a vibrant society which can be expressed in different ways by which individuals tell their stories, remember their past as well as entertain themselves and imagine the future (Raman et al., 2017). The creative expression of the individuals help in defining what they are, how they should see the world through the eyes of the others. Along with the intrinsic values, culture is also seen to pr...
Read MoreAnswer: The above statement states that Money and Financial rewards are an important part that focuses on maintaining the relations of the employees. It is one of the major factors that help to motivate the employees in the workplace. It can be evaluated that the main focus of the employees is on money or the salary which is offered by the company. In motivating the employees, money is one of the factors that also give impact on the overall pr...
Read MoreAnswer: Introduction: Unlike the multinational, global and international strategies, the transnational strategy enables the firms to achieve local flexibility with rapid absorbing and differing innovation of parent company. The transnational strategy implies seeks global integration with operational efficiency and performance on a continued basis (Ambler, 2015). The choice is about global strategies where business firms can locate the d...
Read MoreAnswer: Introduction Financial Reporting is regarded as one of the major part in the financial operations of the companies and it is needed for the business organizations to follow all the required regulations and principles at the time of the development and presentation of the financial statements. The Conceptual Framework for financial reporting is an essential aspect for the business entities as it provides the companies with all the requ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Thanks for doing it on time...great work...fingers crossed for the grades...i hope i get good grades...its a great website to do assignments and all the exams
Australia
Satisfied with the writing style. The writer responded immediately for the revisions which were requested.
Australia
did not have time to start on my assignment and randomly googled for people to do it for me. To my surprise, i found myassignmenthelp and they did it for me just on time for my submission with even time to spare. My first time, but definitely not my ...
Australia
Thank you, thank you, thank you very much. It is one of the most beautiful and highest levels of the solution that I have seen in my life. In all honesty, the expert is very distinguished and he was at the heart of the solution to answer all the poin...
Australia