Assignment: Ransomware and Virus Protection
You work as an information security specialist for a large financial company and your CISO has asked you to investigate recent ransomware attacks. The CISO wants to ensure that the company is well protected against these types of attacks.
Write a paper in which you answer the following:
- Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.
- Using Google, search for a recent attack involving ransomware that has occurred within the last 3 months. Explain the type of business, how the attack was detected, and the outcome of the attack.
- Propose what users and system administrators should do when a potential infection is suspected.
- Compare and contrast viruses, worms, and Trojans. Indicate which of these you consider to be the greatest danger to computer users and/or the greatest challenge for security personnel to protect against.
- Use the Internet to identify three commercially available antivirus software products for corporate use. Compare the features of each and describe which one you would recommend (and why).
- Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
- Analyze system vulnerabilities exploited by hackers.
- Design plans that remove Trojans, backdoors, and malware from infected systems.
- Use technology and information resources to research issues in cybercrime techniques and response.
- Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.
Note: Use quality resources and assignment will be check for plagiarism.
- Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.–
Levels of Achievement:
Unacceptable 0 (0%) – 13.8 (13.8%)
Fair 14 (14%) – 15.8 (15.8%)
Proficient 16 (16%) – 17.8 (17.8%)
Exemplary 18 (18%) – 20 (20%)
Determine the best practices that should be implemented by the security department to help reduce the risks posed by ransomware. Propose what users and system administrators should do when a potential infection is suspected.–
Levels of Achievement:
Unacceptable 0 (0%) – 20.7 (20.7%)
Fair 21 (21%) – 23.7 (23.7%)
Proficient 24 (24%) – 26.7 (26.7%)
Exemplary 27 (27%) – 30 (30%)
Compare and contrast viruses, worms, and Trojans. Indicate which of these you consider to be the greatest danger to computer users and/or the greatest challenge for security personnel to protect against.–
Levels of Achievement:
Unacceptable 0 (0%) – 13.8 (13.8%)
Fair 14 (14%) – 15.8 (15.8%)
Proficient 16 (16%) – 17.8 (17.8%)
Exemplary 18 (18%) – 20 (20%)
Use the Internet to identify three commercially available antivirus software products for corporate use. Compare the features of each and describe which one you would recommend (and why).–
Levels of Achievement:
Unacceptable 0 (0%) – 13.8 (13.8%)
Fair 14 (14%) – 15.8 (15.8%)
Proficient 16 (16%) – 17.8 (17.8%)
Exemplary 18 (18%) – 20 (20%)
Provide and utilize at least three reputable references.–
Levels of Achievement:
Unacceptable 0 (0%) – 3.45 (3.45%)
Fair 3.5 (3.5%) – 3.95 (3.95%)
Proficient 4 (4%) – 4.45 (4.45%)
Exemplary 4.5 (4.5%) – 5 (5%)
Clarity, writing mechanics, and formatting requirements–
Levels of Achievement:
Unacceptable 0 (0%) – 3.45 (3.45%)
Fair 3.5 (3.5%) – 3.95 (3.95%)
Proficient 4 (4%) – 4.45 (4.45%)
Exemplary 4.5 (4.5%) – 5 (5%)