0% found this document useful (0 votes)
19 views

Threat Landscape

Uploaded by

French Williams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Threat Landscape

Uploaded by

French Williams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Threat Landscape

1. How Ransomware Affects Your Computer


a. Ransomware has the potential to encrypt files on your computer, which in turn
results in a demand for payment in exchange for decryption and release of such files
b. Prevention is the best way to resolve a ransomware threat. This is accomplished by
avoiding suspicious and/or fake emails and websites, avoiding clicking on popup
windows and having a proper anti-malware application installed on your system.
For large computer networks, a proper security team should be utilized.
c. Ransomware is paid in bitcoin due to anonymity. Bitcoin does not require the use of
any bank, thus making these transactions untraceable.
d. As of today, one Bitcoin is equal to $57,449.00 USD.

2. Social Engineering
a. Social engineering is the art of manipulating people so that they give up confidential
information.
b. The best method for combating social engineering is to never share/release
confidential information, enable spam filters, never share passwords or use the
same password on multiple websites, keep software up to date, be cautious when
visiting websites and never open suspicious emails or click on suspicious links.

3. Authentication
a. Two-Factor Authentication works by adding an additional layer of security to your
online accounts. It requires an additional login credential – beyond just the
username and password – to gain account access and getting that second credential
requires access to something that belongs to you.
b. An example of 2FA is entering a password to access an account and then receiving
an email requiring additional information before being granted access.
c. 2FA adds another security layer to the login process, reducing the chances of your
account getting hacked. Just knowing and entering your password is not enough
since there is a second layer which is usually time sensitive. This makes the process a
whole lot more secure.

4. Data Destruction
a. You can destroy a hard drive by wiping its contents and disassembling its parts for
ultimate security. A better option is to take it to a data destruction facility.
b. All data should be erased, and memory wiped before disposal. Any SD cards should
also be removed. The device should then be placed in an electronics recycling drop
box or machine.
c. Paper records containing personal and sensitive information should be shredded
with a crosscut, diamond-cut or confetti-cut paper shredder.

5. Infections
a. A worm is a standalone malware computer program that replicates itself in order to
spread to other computers, usually spreading itself via computer networks.
b. The difference between a virus and a worm is that viruses must be triggered by the
activation of their host; whereas worms are stand-alone malicious programs that
can self-replicate and propagate independently as soon as they have breached the
system.
c. Rootkits can be especially difficult to detect and remove because they operate at the
same security level as the operating system itself and are thus able to intercept or
subvert the most trusted operating system operations.
d. A Trojan horse is a type of malware that is often disguised as legitimate software.

6. Virus Recovery
a. A user should always keep their antivirus software current and always scan all
programs that are installed and downloaded. Daily scans should also be enabled so
that when the system is idle, the security tasks can be performed. Enabling the
firewall is also recommended.
b. Steps to be taken after finding a virus on your system include stopping the viral
process (by use of an antivirus program), removing malicious files, undoing any
changes made by the threat, checking and repairing the registry, checking system
files and software and reintroducing computers to the network. Keeping security
software updated should also be a priority as well as keeping a backup of your
system.

You might also like