CIS5205 Management Of Information Security

CIS5205 Management Of Information Security

Free Samples

CIS5205 Management Of Information Security

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

CIS5205 Management Of Information Security

0 Download4 Pages / 794 Words

Course Code: CIS5205
University: University Of Southern Queensland

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Questions:
Research the relevant literature and provide a critical overview of the WannaCry Ransomware Attack by answering the following questions:
 
Q1 What sort of cyber security attack was WannaCry Ransomware Attack and when did it first emerge and occurQ2 What was the impact of the WannaCry Ransomware Attack in dollar terms for organisations globally – give two specific examples of organisations that were impacted by the WannaCry Ransomware Attack Q3 Explain how the WannaCry Ransomware Attack works as a process and technically – considering the perspectives of both the attacker and organisation that could be attacked 
Answer:
The WannaCry RansomWare Attack in summary  
The WannaCry Ransonware attack was first occur in May 2017 in the whole world. The attack mainly targeted the computers which was running on the windows operating system. The attack is basically they first attacks the victim’s computer and encrypt their data. After the data encryption they use to ask for a ransome amount of money from the victim to get back their data. The operating system vendor which is Microsoft though released some patches to the operating system to prevent the exploit (Mattei, 2017). The systems that are infected and running on old data security measurement are mainly targeted by the attackers.
Q1 What sort of cyber security attack was WannaCry Ransomware Attack and when did it first emerge and occur   

Attack Description
 

WannaCry Ransomware Attack

When It First Emerged and Occur
 

WannaCry Ransomware attack first emerged and ocured in May 2017.

Impact Globally ($$$)
 

The global impact of the WannaCry Ransomware is about $4 billion United States Dollar.

Q2 What was the impact of the WannaCry Ransomware Attack in dollar terms for organisations globally – give two specific examples of organisations that were impacted by the WannaCry Ransomware Attack
The impact of WannaCry Ransomware attack for the global organizations are huge. Arounr 200,000 computers were attacked around 150 countries. And the amount that is loss by this attack can be of $4 billion U.S Dollar.

Company name

Date attacked

Impact of the attack – ($$$) and Consequences

Renault

13.05.2017

The impact is huge as it is one of the leading automobile manufacturer. The amount asked is around $500 to restore the access. The company fixed the vulnerabilities and the tools that are related by the shadow brokers

Hitachi
 

12.05.2017

The amount that was asked from the companies are from $300 to $600 for 3 days and 7 days basis respectively. The companies then uses the required patches that are released by Microsoft to prevent the further attacks and vulnerabilities.

As a process
The process of wannacry ransomware is very simple in general. The attacker’s first search for the victims those are using old and out dated operating system. The old operating systems are often the infected system which is easy to exploit and the wannacry attacker’s main target are those device which are infected and where the security is less. After exploiting the device the attackers first encrypt the data that are in the device (Kao and Hsiao, 2018). After encrypting the data they ask ransom amount of money from the victim. The amount is basically of $300 and $600. After the victim pay the money using bitcoin which is also a crypto currency. When the ransome amount is given then the user get back his access to his/ her data. The operating systems that passed the validity of its own are mainly in the target because an operation system that is past its end of life has no security and many security loop wholes which is prone to be vulnerable (Mohurle & Patil, 2017). The wannacry attackers installed backdoors on the device that are infected and then do the next steps for the ransomware attacks. 
Technically
The hackers and the creators of the WannaCry Ransomware Attack attacks the the windows devices that are vulnerable, it already discussed earlier. The NSA developed a malware to exploit the world by using the DoublePulsar backdoor malware and by EternalBlue SMB exploit for the installation of wannacry on the windows systems. EternalBlue is a piggybank system which is the main thing behind this attack. EternalBlue and SMB protocols are exploit the windows systems (Chen and Bridges, 2017). EternalBlue.exe runs a script which targets the Windows computers to executing by using following commands:

SMB echo request is sent to the targeted machine
Environment is set up to exploit the system which is vulnerable
Fingerprinting of SMB protocol is completed
An attempt is made to exploit
If the attack is successful, then DoublePulsar malware s being checked
DoublePulsar pinged for a reply from SMB

The doublePulsar is a tool which bypass the measurement of authentication of a system and then creates a backdoor which allows the remote access. The DoublePulsar fully transfers the system of victims control to the hacker without even 
List of References
Chen, Q. and Bridges, R.A., 2017. Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware. arXiv preprint arXiv:1709.08753.
Kao, D.Y. and Hsiao, S.C., 2018, February. The dynamic analysis of WannaCry ransomware. In Advanced Communication Technology (ICACT), 2018 20th International Conference on (pp. 159-166). IEEE.
Mattei, T.A., 2017. Privacy, Confidentiality, and Security of Health Care Information: Lessons from the Recent WannaCry Cyberattack. World neurosurgery, 104, pp.972-974.
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5).

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 4 pages

PAY 2 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). Management Of Information Security. Retrieved from https://myassignmenthelp.com/free-samples/cis5205-management-of-information-security/backdoor-malware.html.

“Management Of Information Security.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/cis5205-management-of-information-security/backdoor-malware.html.

My Assignment Help (2021) Management Of Information Security [Online]. Available from: https://myassignmenthelp.com/free-samples/cis5205-management-of-information-security/backdoor-malware.html[Accessed 18 December 2021].

My Assignment Help. ‘Management Of Information Security’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Management Of Information Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/cis5205-management-of-information-security/backdoor-malware.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

If you are terrified of math assignments, do not hit the panic button yet. Experts at MyAssignmenthelp.com are at your disposal to provide you with efficient math homework help. If you find calculus, algebra, geometry, to be intricate, then you should seek the assistance of our math solvers. Moreover, we provide economical service to help you with your query ‘who will do my math homework at an affordable price?’ The math question solvers also provide rechecking to make sure that the answers are authentic.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
Anonymity
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Essay
Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Report
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Other
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
08/10/2021
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
08/10/2021
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
08/10/2021
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
08/10/2021
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
×

Powered by essayworldwide.com

× WhatsApp Us