Question

In: Computer Science

Case Study 1: Recent attacks How could the attack been prevented if the five fundamental security...

Case Study 1: Recent attacks

  1. How could the attack been prevented if the five fundamental security principles—layering, limiting, diversity, obscurity, and simplicity—had been applied?

  1. Create a table that lists each of these security principles and how they could have been used to mitigate the attack.

Case Study 2: Crypto-malware Attacks

Use the Internet to research some of the recent different crypto-malware ransomware attacks.

  1. Define Crypto-malware Attacks and list some of them.
  2. What do they do?
  3. Why are they so successful?
  4. How are they being spread?
  5. What can users do to protect themselves?

Solutions

Expert Solution

Case Study 1: Please mention the attack being referred to.

Case Study 2:

Define Crypto-malware Attacks and list some of them.

Crypto-malware ransomware is a type of harmful program that encrypts files stored on victim's device in order to extort money from victim. These are malwares which holds data as hostage. The ransomware are increasing every year.

Here are some of the biggest attacks : WannaCry (2017), SamSam(2015), SimpleLocker(2015), TeslaCrypt (2016)

What do they do?

It essentially takes the files hostage and in return demands a ransom in exchange for the decryption key needed to restore the files. It scrambles the file to make it unreadable. To restore it to normal use, a decryption file will be needed.

There are some malwares which encrypt specific types of files. While others encrypt many different file types.

However, there's a malware which directly encrypts Master Boot Record (MBR) which is special computer program that loads on boot, allowing all other programs to run. After the encryption is complete, the crypto-ransomware will display a message containing the ransom demand. The amount will vary ans is accepted in Bitcoins or a similar digital cryptocurrency.

Why are they so successful?

There are three reason:

  • It has been around for a while, which means it has evolved over a time
  • Process is automated and straightforward. Doesn't require finding important information about victim
  • It's highly scalable. Can initiate attack on single click by sending millions of email!
  • Payment in BitCoin make the identity of attacker untraceable.

How are they being spread?

  • Via files or links delivered through emails or messages
    • Attachments download crypto-ransomware onto the device.
  • Downloaded onto your device by other threats like trojan-downloaders

The files received can't directly be triggered, they need to be opened. This is where victim is tricked to open the file.

What can users do to protect themselves?

  • Backup data regularly
  • Regularly update and apply security patch in all your OS
  • Enable all your antivirus solution's security features
  • Take emails from unknown sender with pinch of salt, especially if there is attachment
  • Keep antivirus up to date

Related Solutions

Which cyber security measure would have been most likely to have prevented the 2016 successful attack...
Which cyber security measure would have been most likely to have prevented the 2016 successful attack on the Democratic National Committee (DNC): A. Stronger passwords used by DNC employees B. 2-factor authentication that uses a password and a security question for the user C. Hardware 2-factor authentication D. 2-factor authentication that uses a password and a text to the user's phone E. Software 2-factor authentication
1. How could this fraud have been prevented? Why is this a difficult fraud to prevent?...
1. How could this fraud have been prevented? Why is this a difficult fraud to prevent? 1. What factors in Johnson’s control environment have led to and facilitated the manager’s manipulation of inventory? 2. What pressures did Debbie have to overstate inventory? 3. What rationalization did Debbie use to justify her fraud? . How could this fraud have been prevented? Why is this a difficult fraud to prevent?
"Today’s Attacks and Defenses at the beginning of this chapter illustrated how a security researcher could...
"Today’s Attacks and Defenses at the beginning of this chapter illustrated how a security researcher could manipulate a help desk support technician into compromising security. If you were to create your own social engineering attack, what would it be? Using your place of employment or school, first determine exactly what your goal would be in the attack, and then craft a detailed description of how you would carry out the attack using only social engineering to achieve your goal. You...
How could the Fall of Enron have been prevented and what are ethical concerns as to...
How could the Fall of Enron have been prevented and what are ethical concerns as to why it happened?
Describe an occasion where bias impacted project objectives. How could it have been prevented?
Describe an occasion where bias impacted project objectives. How could it have been prevented? Were any recovery strategies implemented, or did the occasion result in a game changer or show-stopper?
(ONLY NEED ANSWER FOR PART 4 OF THIS CASE STUDY) Wana Decryptor Attack Case Study -...
(ONLY NEED ANSWER FOR PART 4 OF THIS CASE STUDY) Wana Decryptor Attack Case Study - Part 1 Scenario: You are employed at a bank of medium size, worth 5 billion dollars. The IT Director reports to the CIO – both the CIO and CISO report to the COO. At 11:00 A.M. on a Monday morning, the IT Help Desk receives a call from a user in the Wire Transfer Department. He reports that his computer is frozen and appears...
Book: Too Big to Fail 1)How could such an event be prevented in the future (2008...
Book: Too Big to Fail 1)How could such an event be prevented in the future (2008 financial Catastrophe )
Wana Decryptor Attack Case Study - Part 1 Scenario: You are employed at a bank of...
Wana Decryptor Attack Case Study - Part 1 Scenario: You are employed at a bank of medium size, worth 5 billion dollars. The IT Director reports to the CIO – both the CIO and CISO report to the COO. At 11:00 A.M. on a Monday morning, the IT Help Desk receives a call from a user in the Wire Transfer Department. He reports that his computer is frozen, and appears to have a message that some type of ransom is...
What were the causes of the Civil War? Could the war have been prevented? Why is...
What were the causes of the Civil War? Could the war have been prevented? Why is this event so important in American History!
1.a.Explain how differential action could be prevented. b.Explain how to achieve reverse direction in Epicyclic Gears.
1.a.Explain how differential action could be prevented. b.Explain how to achieve reverse direction in Epicyclic Gears.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT