Access Millions of academic & study documents

Wannacry Attack

Content type
User Generated
Subject
Computer Science
School
Campbellsville University
Type
Homework
Showing Page:
1/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: WANNACRY ATTACK 1 Wannacry Attack Student’s Name Institution WANNACRY ATTACK 2 Wannacry Attack In the wake of increased dependence and innovation in technology, hackers have also evolved to the extent of advancing the methods through which they are able to gain income from cyber-attack activities. This formed the logic of the May 2017 Wannacry Attack on Windows computer systems. In this attack, the attackers encrypted the files on the target computer systems and demanded that the victims pay a particular amount in the form of Bitcoin, for the attacker to then send the decryption key and allow the computer users to access their information on the devices (Mohurle & Patil, 2017). Consequently, the attack exposed significant sophistication and vulnerability of society to the very systems intended to spark development in the information technology sector. The Bitcoin would revolutionize business transactions by popularizing digital currency, but the challenges associated with tracing the transactions created a problem by providing hackers with opportunities as significant as those that facilitated the Wannacry attack. Notably, one of the most notable consequences ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4