Disciplines

Other Computer Engineering | Risk Analysis

Abstract (300 words maximum)

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 that was responsible for a major U.S pipeline unable to function for days and being declared a state of emergency. This work reviews the components of ransomware attacks and the impact of ransomware followed by common defense techniques and their limitations.

Academic department under which the project should be listed

CCOB - Information Systems and Securty

Primary Investigator (PI) Name

Hossain Shahriar

Share

COinS
 

Ransomware: Evaluation of Mitigation and Prevention Techniques

Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 that was responsible for a major U.S pipeline unable to function for days and being declared a state of emergency. This work reviews the components of ransomware attacks and the impact of ransomware followed by common defense techniques and their limitations.