Abstract

As the world continues to grow and embrace technology ransomware is growing problem. When ransomware encrypts storage sytems, systems shutdown, productivity grinds to a halt, and serious long-term damage takes place. As this is a known problem many firms have developed functionality to address ransomware issues in key security technologies such as intrusion protection systems. Many firms, especially smaller ones, may not have access to these technologies or perhaps the integration of these technologies might not yet be possible due ot varying circumstances. Regardless, ransomware must still be addressed as cyber miscreants actually target weak and unprotected environment. Even without tools that automate and aggregrate security capability, systems administrators can use systems utilities, applications, and digital forensic techniques to detect ransomware and defend their environemnts. This paper explores the literature regarding ransomware attacks, discusses current issues on how ransomware might be addressed, and presents recommendations to detect and investigate ransomware infection.

Highlights

  • 1.1 The Ransomware ChallengeDetecting ransomware is a challenge that virtually all organizations worldwide

  • Systematic literature reviews entail defining the scope of the literature review by developing questions to guide research and data review to foster efficiency and focus the literature review (Xiao & Watson, 2017)

  • It stands to reason that the techniques used to investigate ransomware incidents might be proactively applied to detect ransomware infection before ransom notification

Read more

Summary

Introduction

1.1 The Ransomware ChallengeDetecting ransomware is a challenge that virtually all organizations worldwide Once miscreants have access to storage devices, they encrypt system data and make systems toally inaccessible (Brewer, 2017; Symantec, 2016). The consequences of this act are tremendous. If the primary disk partition of a system becomes inaccessible, the machine becomes unable to boot. Both user and system applications often depend on data availability to operate effectively, and without access to critical or required data, programs may cease to function or may act randomly. Nonfunctionality obviously inhibits the ability to use the system or application for its intended purpose, as well as potentially posing severe consequences for workflow or actions dependent on the system or application

Methods
Findings
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call