Access Millions of academic & study documents

Alternatives Against Ransomware.edited

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/5
Surname 1
Student Name
Instructor
Course Number
Date
Ransomware Solutions
Business data is a critical and nearly the most valuable asset in any organization.
However, storing and accessing the data while maintaining information security poses a
challenge to most organizations. Other business networks contain security vulnerabilities that
allow attackers to perform attacks through methods like ransomware attacks. Ransomware
attacks involve encryption of organization's files and asking for ransom before decrypting the
data for the organization to restore the normalcy state (Brewer 6). Due to the need for business
continuity and the sophisticated encryption of the files by attackers, businesses end up paying the
ransom hence encouraging the attacks. However, the enterprises have alternatives to ransomware
through an implementation of preventive measures and data recovery methods as discussed in
this discussion.
User Training and Education
Providing training and teaching to business employees and other users on ransomware
preventive measures. Business has an alternative of addressing the ransomware through
providing education to users of the network on possible sources of ransomware attacks, ways to
identify ransomware and preventive measures (Ali 88). Even though an organization installs all
the technical safeguards on the network, the network, ransomware attacks will only take an

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
Surname 2
individual user to click on a suspicious attachment link and infect the whole system. The
important files with a ransomware attack files have extensions like .html, .png, and .url formats
with file names like HELP_DECRYPT. Therefore, an organization should educate users and
inform them not to open files or links of files with such extensions and file names. The training
should also be regular and comprehensive to ensure all the dynamic nature of ransomware
attacks is well known to all users.
An example of areas to educate business staff and users on are the usages of emails.
Ransomware attackers can send a phishing email to users asking them to open a link posted from
a boss. However, looking at the relationship of attachment in the email, it redirects to an external
malicious website. Clicking on the link can also download and install a virus automatically in the
background hence infecting the system (Ali 89). Educating the users will involve helping them
identify malicious emails by reading the email headers before downloading or clicking any link
on it.
System Backup and Recovery
Implementation of a dynamic backup and recovery methods in the business.
Organizations should have a backup strategy for all the business databases and files in real-time
to ensure business continuity. A dynamic and real-time backup will help restore all the encrypted
and compromised files in cases of ransomware attacks. The network administrator can clear all
the systems and files in the infected systems before moving the backed up files and data on the
system. This method is painless, faster and cost-effective (Simmonds 11). Additionally, the
backup and recovery process will help restore the files in the normal state without paying the
ransom hence making it one of the best alternatives available for businesses.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Surname 1 Student Name Instructor Course Number Date Ransomware Solutions Business data is a critical and nearly the most valuable asset in any organization. However, storing and accessing the data while maintaining information security poses a challenge to most organizations. Other business networks contain security vulnerabilities that allow attackers to perform attacks through methods like ransomware attacks. Ransomware attacks involve encryption of organization's files and asking for ransom before decrypting the data for the organization to restore the normalcy state (Brewer 6). Due to the need for business continuity and the sophisticated encryption of the files by attackers, businesses end up paying the ransom hence encouraging the attacks. However, the enterprises have alternatives to ransomware through an implementation of preventive measures and data recovery methods as discussed in this discussion. User Training and Education Providing training and teaching to business employees and other users on ransomware preventive measures. Business has an alternative of addressing the ransomware through providing education to users of the network on possible sources of ransomware attacks, ways to identify ransomware and preventive measures (Ali 88). Even though an organization installs all the technical safeguards on the network, the network, ransomware attacks will only take an Surname 2 individual user to click on a suspicious attachment link and infect the whole system. T ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents