Ransomware is a type software that cyber criminals use to encrypt valuable, sentimental, or sensitive data with the goal of demanding money (i.e. ransom) to unencrypt the affected data. If the data is left encrypted it is unusable to its owner.
While there are a variety of different ransomware programs available on the Internet, how they get on a person’s computer boils down to one of two techniques. The attacker either uses social engineering (i.e., tricking the target into clicking on an email attachment the target believes is from a trusted source) or by exploiting a software vulnerability on a user’s computer/device to install itself without the owner’s knowledge. Most troubling about Ransomware, there is no guarantee that even paid the ransom will ensure that the data will be unencrypted.
This module teaches students how to recognize ransomware and adequately prepare their systems so that the problem can be considered nothing more than a nuisance. The single best defense against ransomware is to regularly backup the data on your devices.
- Definition/Intro … what it is, in short, using the information above…
- Examples of how it works… or specific ones as WannaCry and Petya
- Results of the ransomware attacks – regarding losses… the legacy of change of business thinking…
- Protection and what to do – in a similar sense to malware… encrypt already before being hacked … done on the client machines … so the hack cannot access the files the first time (as well not be able to steal data if the device is lost or stolen) … there is no way to be attached… encryption keys kept outside of the devices … perform updated of all applications already (better manual… vs update… but update) … backups…offsite (or not accessible) … The great link about sources of ransomware, how to protect yourself against ransomware can be found @ A beginners guide to ransomware