23 Dec 2022

160

Ransomware Cyber Attacks

Format: APA

Academic level: College

Paper type: Critical Thinking

Words: 284

Pages: 1

Downloads: 0

Ransomware is a virus that prevents a user of personal access to files or even their systems, demanding a ransom payment to reclaim access. It is secretly installed in a computer without the user's authorization, thus encrypting data that is in the computer of the victim. The decryption of the victim’s data requires paying ransom in return. Ransomware cyber-attacks can lead to data loss since the process of decrypting this data can either cause the data to be corrupted and even lost while the victim makes attempts to restore or decrypt data without the permission of the hacker. In addition, data is lost if the victim fails to meet the demands of the ransom. The hackers can even decide to sell the data to another company or party willing to buy it, thus data breach. 

I believe that ransomware should be treated as cybercrime. Individuals who are experienced in the cybercrime attacks, and who resolve these issues are in a position to use their IT skills to find these criminals. Ransomware also brings down businesses as their data is bleached and negatively affected, and a solution to this problem is vital. The ransomware issue today has surpassed the issue of drug trafficking, as the advancement in technology has also helped these hackers advance in their game (Mohurle & Patil, 2017) . The ransom that the hackers ask for in return if they decrypt data, and finding ransomware as a profitable market implies that ransomware should be viewed as cybercrime. Ransomware has possible consequences for both the hacker and the victim. The victim's data can leak, and end up on the wrong hands, thus breaching an organization's privacy. Also, ransomware can result in data loss for the company. On the other hand, the hacker can be jailed if they are caught after risking an organization’s privacy and data loss. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

References 

Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017.  International Journal of Advanced Research in Computer Science 8 (5). 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Ransomware Cyber Attacks.
https://studybounty.com/ransomware-cyber-attacks-critical-thinking

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration