You are on page 1of 9

E S S AY O F C O M M U N I T Y

R A N S O M WA R E AT TA C K

Provide by : Faisal Tamim


Table of content

1.What is ransomware attack


2. How did the IT department at ZU
warn the university about the problem
3. The biggest lost of a company
4. Solutions 1
5.Solution 2
What is ransomware
attack

Ransomware Attack Overview


• Malicious program blocks user
access to personal computer
resources or data.
• Encrypts personal data.
• Takes user data hostage.
• Victims asked to pay a ransom to
remove restriction by crypto currency.
How did the IT department at
ZU warn the university about
the problem

-ZU IT Department Warns Students


• Warns against unknown emails.
• Encourages caution and avoidance.
• Alerts students to avoid clicking
on potentially harmful emails.
The biggest lost of a
company

"Travelex Ransomware Attacks"


• Travelex computers
compromised on New Year's Eve
2019.
• Total cost: 2.3 million dollars for
information restoration.
Solution 1: Installation of safe and
offline site backups.

• The IT department at ZU is developing this


technique.

• SSDs are the best storage for long-term


information due to their smaller and faster size.

• Offline backups enhance data recovery, allowing


restoration of data during ransomware attacks.

• minimizes time loss and financial damage.


Solution 2: behavior-based
detection to spot early
ransomware attacks.

• tool that scans data downloaded from monitors,


detecting abnormal activities.
• It provides early warning of ransomware attacks
before encryption, preventing data and information loss.
• Behavior-based detection is easy to use and saves time,
making it a key tool in combating ransomware.
• It helps identify activities out of sync with normal
operations, enabling quick action to mitigate damage
THANK YOU
Reference

1. Ahanger, T. A., Tariq, U., Dahan, F., Chaudhry, S. A., & Malik, Y. (2023).
Securing IoT Devices Running PureOS from Ransomware Attacks:
Leveraging Hybrid Machine Learning Techniques. Mathematics, 11(11),
2481. https://doi.org/10.3390/math11112481
2. Cen, M., Jiang, F., Qin, X., Jiang, Q., & Doss, R. (2024a). Ransomware early
detection: A survey. Computer Networks, 239, 110138.
https://doi.org/10.1016/j.comnet.2023.110138
3. Beaman, C., Barkworth, A., Akande, T. D., Hakak, S., & Khan, M. K. (2021).
Ransomware: Recent advances, analysis, challenges and future research
directions. Computers & Security, 111, 102490.

The Refrence 4.
https://doi.org/10.1016/j.cose.2021.102490
Hassan, N. A. (2019). Ransomware revealed. In Apress eBooks.
https://doi.org/10.1007/978-1-4842-4255-1
5. Connolly, L. Y., Wall, D. S., Lang, M., & Oddson, B. (2020). An empirical
study of ransomware attacks on organizations: an assessment of severity
and salient factors affecting vulnerability. Journal of Cybersecurity, 6(1).
https://doi.org/10.1093/cybsec/tyaa023
6. Irwin, L. (2021, May 18). The 5 biggest ransomware pay-outs of all time.
IT Governance UK Blog; IT Governance.
https://www.itgovernance.co.uk/blog/the-5-biggest-ransomware-pay-out
s-of-all-time

The link for google drive:


https://drive.google.com/drive/folders/1W
SIdJoL7v7kuwuXkBVyGKnAE-8DOwYps
?usp=sharing

You might also like