Case Study 1 PBT
Case Study 1 PBT
DFP40263
SECURE MOBILE
COMPUTING
1. 34DDT23F1061
2. 34DDT23F1121
3. 34DDT23F1020
4. 34DDT22F2004
REG NO
PROGRAMME
INSTRUCTIONS :
1. Answer ALL the questions
2. Submit the assessment on _______________
MARKING SCHEME
CLO 2 PLO 5
/20
TOTAL
THE ENTIRE QUESTION IS BASED ON JTMK’S QUESTION BANK
APPROVED BY PROGRAMME LEADER. SIGNATURE IS NOT REQUIRED.
Duration: 1 WEEK
CLO3 Demonstrate best practices in developing mobile security computing in context of social
environment (A3, PLO8)
Instructions:
Security Testing and Evaluation of Ransomware
2
Report format
Report format
Font size: 12
Font type: Time New Roman
Paragraph:
Alignment: Justify
Line spacing: Single
Page number: Bottom right side /Plain number 3
3
How To Identify The Ransomware Attack, Types Of Ransomware And How To
Mitigate Ransomware Attack
1.Introduction
Ransomware can be considered as a serious threat when it comes to protection of information assets.
The main targets are internet users. Ransomware hijacks user files, causes difficulties and then
requests some funds through extortion for decryption purposes (Bhattacharya & Kumar, 2017).
Ransomware can be categorized as malware which can affect the vulnerability of the user's system,
allowing the system to be accessible individually and eventually encrypts all the files that have been
targeted (Gonzalez & Hayajneh, 2018).
The world was initially unprepared to deal with the attacks as it was difficult for to
become widespread then due to personal computers usage factor and the Internet was still in
its infancy. In addition, encryption technology was still limited (Srinivasan, 2017). Ransomware
creators and distributors are aware that they could earn a much higher ransom when the main
targets are companies and organizations rather than individual users (Richardson & North, 2017).
They achieve the goal of gaining more profits through computers at police departments, city
halls, schools. Things become more critical when hospitals are also targeted (Chhillar, 2017). The
affected countries are predictably to be among the top countries of where organizations and
individuals have the most money. According to Symantec, the United States is in the top
position affected by Ransomware, followed by Japan, United Kingdom, Italy and Germany
(Everett, 2016).
You won’t have to wait for an unreliable decryption key to recover your system; with
swift action and a healthy backup schedule, your files may never be lost.
4
3.Types Of Ransomware
There are several types of ransomware and they have been categorized into three
basic types. According to Yaqoob et al., (2017), the three basic types of ransomware
are known as Crypto Ransomware, Locker Ransomware, and Hybrid Ransomware.
The first type of ransomware is Crypto Ransomware. Another name for this
ransomware is encrypting ransomware. This ransomware deals with complex
algorithm and it blocks users from accessing specific files. Users need to pay
ransom by using bitcoins in order to decrypt the data. There is another type
of encrypting ransomware which is called WannaCry Ransomware.
This ransomware is a modern ransomware which encrypts certain files types in the
infected systems and forces users to pay ransom through certain online payment
methods to get a decrypt key (Deo&Farik, 2016). The second type of ransomware is
Locker Ransomware. Locker ransomware is a type of malware that locks the
target out of the operating systems and prevents access to the target desktop,
applications and files (Shah &Farik, 2017).
5
4.How To Mitigate Ransomware Attack
The first and most important step you should take to minimize the risk of a
ransomware attack is to invest in a cybersecurity solution that includes ransomware
attack mitigation. But that's not the only way to secure digital assets. Here are key
ransomware countermeasures that businesses can use to mitigate and prevent
ransomware attacks.
6
Determine the cause of the breach.
Understand what information has been lost.
Afterwards, reassess your ransomware mitigation strategies to determine how you can
strengthen protections for the future.
7
Update and Patch Your Software Frequently
Utilize patch management software to ensure software is kept up to date. The
software looks for security vulnerabilities in software and corrects them without
delay. It can also automatically download the latest versions of software.
Along with using software patches, keep an eye out for security vulnerabilities.
Follow the cybersecurity landscape to learn about new cyber threats as soon as they
are discovered. This can help you stay out in front of cybercriminals.
5.Conclusion
8
References
Baker, K. (2023, January 29). What Is Ransomware Detection? Retrieved from Crowdstrike:
https://www.crowdstrike.com/en-us/cybersecurity-101/ransomware/ransomware-detection/
9
DFP40263 SECURE MOBILE COMPUTING
CASE STUDY
MARKING RUBRIC
CLO 3 : Demonstrate best practices in developing mobile security computing in
context of social environment
GRAND T
(Total Score/1
10