Question

In: Operations Management

Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal...

Two major computer threats to a system are hackers and viruses. Dfines cybercrime as any criminal action perpetrated primarily through the use of a computer.

1. Using search engine on the Internet, find a current article (one written within the last 3 years) about a computer hacker or a computer virus. Give the site address, and the article title and author and date.

2. Write at least 5 sentences summarizing the article making sure to list any details about the hacker or virus that you chose.

Solutions

Expert Solution

1. Article Name: WannaCry Ransomware: A Detailed Analysis of the Attack

Author: Rohit Langde

Article date: Sep 26, 2017

URL: https://techspective.net/2017/09/26/wannacry-ransomware-detailed-analysis-attack/

2. Summary of the Article:

WannaCry Ransomware attacked computers on May 12, 2017 targeting Microsoft Windows systems. This virus spreads through a vulnerability called EternalBlue in Windows system. EternalBlue employed on a technique called as pool grooming, through which it injected a shell code in the vulnerable systems, which enabled the attacked to access the IP address of system and use of to communicate with SMB protocol. WannaCry has affected various large organizations like LG, Renault-Nissan, NHS, etc. Data of the affected system had got encrypted by the attacker, who desired a large amount as ransom in form of bitcoins and within 3 days of attack. Any organization that denied payment of ransom, had to lose their critical files and information. Microsoft was able to simulate a patch for this vulnerability and a fix was released soon, to save systems from this virus.


Related Solutions

Regarding the criminal justice system could someone discuss in detail two major topics; the police and...
Regarding the criminal justice system could someone discuss in detail two major topics; the police and the various types of punishment that support the criminal justice system?
Discuss any (5) threats faced by computer network users and what strategies might be used to...
Discuss any (5) threats faced by computer network users and what strategies might be used to prevent each of them from happening. the instructions of that question are 1- 1000 word or above 2- set references (book, www, journal article from the full-text databases, current affairs magazine, newspaper ) please with the references
“The success of any system is determined by its ability to survive threats within its Operating...
“The success of any system is determined by its ability to survive threats within its Operating Environment” explain this statement providing examples, use at least two external references to support your explanation. Cite them within the text using APA format. Add references at the end of the assignment also using APA format.
6. A new integrated computer system is to be installed worldwide for a major corporation. Bids...
6. A new integrated computer system is to be installed worldwide for a major corporation. Bids on this project are being solicited, and the contract will be awarded to one of the bidders. As a part of the proposal for this project, bidders must specify how long the project will take. There will be a significant penalty for finishing late. One potential contractor determines that the average time to complete a project of this type is 42 weeks with a...
This chapter describes two models (consensus vs conflict) of the criminal justice system. What are they...
This chapter describes two models (consensus vs conflict) of the criminal justice system. What are they and how do they differ? Which model do you think is more useful? Which is more accurate? Why?
Two major computer companies manufacture and sell computer accessories. The prices of 5 randomly selected accessories...
Two major computer companies manufacture and sell computer accessories. The prices of 5 randomly selected accessories are listed below: Computer Accessory Price Data Computer Accessory Macrohard Price ($) Pear Computer Price ($) keyboard 67.33 65 mouse 54.78 40.24 speaker 135.53 134.82 modem 100.31 95.71 monitor 377.62 352.36 The quality of the computer accessories for both companies are practically the same because both companies purchase the parts from the same wholesaler. Since the market for these accessories is very competitive, the...
List and describe any two Quality System.
List and describe any two Quality System.
The GPS System of an autonomous 18-wheeler is controlled by a computer that has 4 major modules.
 The GPS System of an autonomous 18-wheeler is controlled by a computer that has 4 major modules. For the GPS System to function properly, all 4 modules must function together. Two of the modules have reliabilities of 0.97, and the other 2 have reliabilities of 0.98. A. What is the overall reliability of the 18-wheeler's GPS System? B. Designers have decided that the GPS System is going to be provided with a backup computer identical to the one currently used in the 18-wheeler...
Identify and discuss any five (5) major functions performed by the financial system.
Identify and discuss any five (5) major functions performed by the financial system.
Explain why any threats of terrorism due to friction between two countries could possibly your business,...
Explain why any threats of terrorism due to friction between two countries could possibly your business, even if the terrorism has no effect on the relations between the U.S. and Mexico.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT