Disciplines
Other Computer Engineering | Risk Analysis
Abstract (300 words maximum)
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 that was responsible for a major U.S pipeline unable to function for days and being declared a state of emergency. This work reviews the components of ransomware attacks and the impact of ransomware followed by common defense techniques and their limitations.
Academic department under which the project should be listed
CCOB - Information Systems and Securty
Primary Investigator (PI) Name
Hossain Shahriar
Included in
Ransomware: Evaluation of Mitigation and Prevention Techniques
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 that was responsible for a major U.S pipeline unable to function for days and being declared a state of emergency. This work reviews the components of ransomware attacks and the impact of ransomware followed by common defense techniques and their limitations.