Ransomware case study discussion

User Generated

FbpprePbnpu

Writing

Description

Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business or government facility. Lay out the details of the case, and provide your analysis of what was done and why, and speculate on what should have been done, or could have been done differently. As part of your analysis, you can speculate on what you might have done to change the outcome of your particular case. Draw specific lessons from the case and possible recommendations for future situations.

Write a paper with no less than five pages in which you:

  1. Research the web and identify a case study with an appropriate situation related to penetration testing or hacking for or against a business, organization, or government facility.
  2. Lay out the case details, and provide your analysis of what was done and why, the results of the effort, the specific threats and vulnerabilities, and what mitigation was attempted or should have been attempted.
  3. You may speculate on what actions you might have taken in a similar situation as part of your analysis.
  4. Draw specific lessons and recommendations from your analysis of the case as part of the conclusion, and have a strong concluding paragraph. Be sure to revise your introduction to reflect what the paper accomplished once you finish your first draft.
  5. Use no less than five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

    Note: The above are guidelines, they are not questions to be answered like an exam. Think through your paper so you have a clear idea of your lessons and takeaway, and outline your paper as you research, and before you begin writing. Review the outline and your writing and make adjustments as needed as new ideas are laid out, and assure your introduction, body, and conclusion work as one.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CASE STUDY: RANSOMWARE

Case Study: Hacking
Name
Institutional Affiliation

1

CASE STUDY: RANSOMWARE

2
Case Study: Ransomware

Cyber-attacks have become a famous criminal avenue in modern days. The development of new
coding and computing technologies has been hailed as a significant development that can
enhance the way organizations operate by increasing efficiency. It has led to the realization of
fast forecasting techniques, better estimation and evaluation methods, fast payment and detail
processing software, advanced customer relations management systems, and more effective
analytical powers. However, it has also open doors for adverse applications designed by
malicious individuals who seek to gain access to company or personal finances by either hacking
channels of funds or vital information to extort payments from the victim. These activities have
been marked by the increased incidences of ransomware attacks both on individual computers as
well as organizational systems.
Ransomware is a malicious code usually referred to as malware that targets the files in a
computer to encrypt them in an attempt to source money from the owner through ransom
payments (Dave, 2016). It establishes a highly sophisticated unlock key to deny the victim access
to their files until they meet the demands of the perpetrator. Usually, payments are requested in
bitcoin or other cryptocurrencies to protect the identities of attackers. Such assaults have led to
losses in billions of dollars as well as critical data.
A common malware in this industry is cryptolocker, the famous ransomware that entered the
market in 2013. Although the bout was defeated after managing to collect more than $30 million
in ransom fees within 100 days, it is recognized as the foundation of future attacks with
successor malware being written on the basic codes of the original program (Popoola, & John,
2017). Its effectiveness was on its transmission method, mostly being sent as an email
attachment from a vendor. Users would open the file and unknowingly initiate the installation of

CASE STUDY: RANSOMW...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags