{"id":168398,"date":"2022-02-13T09:00:35","date_gmt":"2022-02-13T03:30:35","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=168398"},"modified":"2022-02-12T23:04:06","modified_gmt":"2022-02-12T17:34:06","slug":"answered-despite-an-increase-in-cyber-threats-there-has-been-a-little-change-in-the-method-of-response-in-the-context-of-this-statement-explain-the-threats-posed-by-ransomware-a","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/answered-despite-an-increase-in-cyber-threats-there-has-been-a-little-change-in-the-method-of-response-in-the-context-of-this-statement-explain-the-threats-posed-by-ransomware-a\/","title":{"rendered":"[Answered] \u2018Despite an increase in cyber threats, there has been a little change in the method of response\u2019. In the context of this statement, explain the threats posed by ransomware attacks and the response required to mitigate the risks.\u202f"},"content":{"rendered":"<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"none\">Introduction: <\/span><\/b><span data-contrast=\"none\">Describe in brief the cyber-attacks and their magnitude.<\/span><span data-ccp-props=\"{}\"><br \/>\n<\/span><b><span data-contrast=\"none\">Body:<\/span><\/b> <span data-contrast=\"none\">Explain Ransomware. Write the threats posed by it. Write measures to mitigate the risk.<\/span><span data-ccp-props=\"{}\"><br \/>\n<\/span><b><span data-contrast=\"none\">Conclusion:<\/span><\/b> <span data-contrast=\"none\">Give a way forward<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-contrast=\"auto\">A cyber-attack is an attempts to steal, expose, alter, disable or destroy information through unauthorized access to computer systems. Cyber-attacks are a concern not only to individuals but also pose a <\/span><b><span data-contrast=\"auto\">threat to the national security<\/span><\/b><span data-contrast=\"auto\"> as was evident from the Stuxnet Worm Attack (2010) that sabotaged the nuclear power programme of Iran. <\/span><span data-contrast=\"auto\">A vast majority of cyber-attacks are directed at small and medium sized businesses. The <\/span><b><span data-contrast=\"auto\">cost of cyber-crimes in 2020<\/span><\/b><span data-contrast=\"auto\"> is believed to be more than <\/span><b><span data-contrast=\"auto\">$1 trillion<\/span><\/b><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Ransomware<\/span><\/b><span data-contrast=\"none\"> is a type of malware attack in which the attacker <\/span><b><span data-contrast=\"none\">locks and encrypts the victim<\/span><\/b><b><span data-contrast=\"none\">\u2019<\/span><\/b><b><span data-contrast=\"none\">s data, important files <\/span><\/b><span data-contrast=\"none\">and then demands a payment to unlock and decrypt the data. According to IBM, ransomware attacks comprised 23% of cyber-attacks and was the number#1 cyber-threat in 2021.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:260}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">The Ransomware attacks pose several threats. Among the most targeted sectors of ransomware are <\/span><b><span data-contrast=\"none\">healthcare, education and research, communications and governments<\/span><\/b><span data-contrast=\"none\"> e.g., several healthcare ransomware attacks in the past few years have disrupted operations of hospitals, leading to <\/span><b><span data-contrast=\"none\">delays in procedures and test<\/span><\/b><span data-contrast=\"none\">s, resulting in an increase in <\/span><b><span data-contrast=\"none\">patient mortality.<\/span><\/b><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:260}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Ransomware attacks are increasing in intensity and frequency<\/span><\/b><span data-contrast=\"none\">, because there are many available soft targets. Statistics suggest that new attacks are taking place every 10 seconds. In fact \u2018<\/span><b><span data-contrast=\"none\">Ransomware as a Service\u2019 (RaaS<\/span><\/b><span data-contrast=\"none\">), has become a full-fledged business model for ransomware developers and has become an industry of its own.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:260}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Ransomware criminals are becoming more sophisticated<\/span><\/b><span data-contrast=\"none\">, with the Dark web allowing criminals to access sensitive corporate networks. They are are using ransomware to <\/span><b><span data-contrast=\"none\">cripple operations of large business enterprises<\/span><\/b><span data-contrast=\"none\"> and governments.\u00a0 For example, the <\/span><b><span data-contrast=\"none\">Colonial Pipeline ransomware attack<\/span><\/b><span data-contrast=\"none\"> compromised the oil supply chain in the USA, which resulted in the rise of oil prices.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:260}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">With the increase in amount of commercial and sensitive data belonging to corporations and Government stored in cloud, the threat of ransomware has increased multi-fold.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335559739&quot;:240,&quot;335559740&quot;:260}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">With the increase in threats posed by ransomware, there is need of concentrated effort to mitigate the risks.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Detailed study of the ransomware attacks of the past to understand the modus operandi of the attackers as well as the vulnerability of the systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Building resilience at both the institution and human level<\/span><\/b><span data-contrast=\"none\">, is needed to create defense against these attacks e.g., National Critical Information Infrastructure Protection Centre <\/span><b><span data-contrast=\"none\">(NCIIPC)<\/span><\/b><span data-contrast=\"none\">, National Computer Emergency Response Team (<\/span><b><span data-contrast=\"none\">CERT-in)<\/span><\/b><span data-contrast=\"none\"> and <\/span><b><span data-contrast=\"none\">Cyber Swachhta Kendra<\/span><\/b><span data-contrast=\"none\"> that improve capacity at both levels.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Preventive and reactive cyber security strategies<\/span><\/b><span data-contrast=\"none\"> are needed and are essential. For example, <\/span><b><span data-contrast=\"none\">Secure Access Service Edge(<\/span><\/b><b><span data-contrast=\"none\">SASE<\/span><\/b><b><span data-contrast=\"none\">)<\/span><\/b><span data-contrast=\"none\"> to reduce the risk of cyber attacks and <\/span><b><span data-contrast=\"none\">Cloud Access Security Broker (<\/span><\/b><b><span data-contrast=\"none\">CASB<\/span><\/b><b><span data-contrast=\"none\">) <\/span><\/b><span data-contrast=\"none\">and <\/span><b><span data-contrast=\"none\">Secure Web Gateway (SWG)<\/span><\/b><span data-contrast=\"none\"> aimed at limiting the risks to users from web based threats.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Use of <\/span><b><span data-contrast=\"none\">Zero Trust Model<\/span><\/b><span data-contrast=\"none\"> and <\/span><b><span data-contrast=\"none\">Micro Segmentation<\/span><\/b><span data-contrast=\"none\"> as means to limit cyber-attacks.<\/span><span data-contrast=\"none\"> The zero trust approach to security aims to wrap security around every user, every device, every connection &#8211; every time i.e. 100% security coverage to all users, devices at all times.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Networks and data structures need to prioritize resilience <\/span><\/b><span data-contrast=\"none\">through de-centralized and dense networks, hybrid cloud structures, redundant applications and backup processes.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"-\" data-font=\"Helvetica Neue\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Promoting a cyber security culture<\/span><\/b><span data-contrast=\"none\"> to make the individual companies prioritize investing in cyber security over maximizing short-term profits.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Cyber-attacks present certain unique challenges which need customized answers. Instead of attempting to devise standard methodologies, and arrive at certain international norms, Governments and cyber security experts should have a pro-active approach to anticipate the moves of cyber criminals and be two steps ahead of them.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: Describe in brief the cyber-attacks and their magnitude. Body: Explain Ransomware. Write the threats posed by it. Write measures to mitigate the risk. Conclusion: Give a way forward\u00a0 A cyber-attack is an attempts to steal, expose, alter, disable or destroy information through unauthorized access to computer systems. Cyber-attacks are a concern not only to&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/answered-despite-an-increase-in-cyber-threats-there-has-been-a-little-change-in-the-method-of-response-in-the-context-of-this-statement-explain-the-threats-posed-by-ransomware-a\/\">Continue reading <span class=\"screen-reader-text\">[Answered] \u2018Despite an increase in cyber threats, there has been a little change in the method of response\u2019. In the context of this statement, explain the threats posed by ransomware attacks and the response required to mitigate the risks.\u202f<\/span><\/a><\/p>\n","protected":false},"author":10320,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[139,25,9],"tags":[10640],"class_list":["post-168398","post","type-post","status-publish","format-standard","hentry","category-mains-marathon","category-mains-marathon-answers","category-public","tag-cyber-attacks","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":"","cached_date":1699983375},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/168398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10320"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=168398"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/168398\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=168398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=168398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=168398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}