Case Study (Conclusion)



The 2017 WannaCry Ransomware Attack, which had a detrimental impact on the entire world, was widely acknowledged. As stated before, this attack could have been avoided by using an intelligent endpoint security solution. Moreover, this is where my major project comes as my major project is about endpoint security. Endpoint security is a subfield in cybersecurity that protects entry points and endpoints from being used by cybercriminals (Kamruzzaman et al., 2022). In addition, understanding the dangers of ransomware and learning how to prevent these attacks is very beneficial, considering that our world is constantly evolving and almost everything is connected to technology. This research also provides how this attack can occur. The primary goal of this study is to highlight the risks and effects of ransomware.


Reference List:

Chen, Q. and Bridges, R.A., 2017, December. Automated behavioral analysis of malware: A case study of wannacry ransomware. In 2017 16th IEEE International Conference on machine learning and applications (ICMLA) (pp. 454-460). IEEE. Available at: Automated Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware | IEEE Conference Publication | IEEE Xplore. [Last Accessed 28th of May 2023]

Hsiao, S.C. and Kao, D.Y., 2018, February. The static analysis of WannaCry ransomware. In 2018 20th international conference on advanced communication technology (ICACT) (pp. 153-158). IEEE. Available at: The static analysis of WannaCry ransomware | IEEE Conference Publication | IEEE Xplore. [Last Accessed 28th  of May 2023]

Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science8(5),pp.1938-1940.Available at: 2261f190e292ad93d6887198d7050dec.pdf (sbgsmedia.in). [Last Accessed 28th  of May 2023]

Tailor, J.P. and Patel, A.D., 2017. A comprehensive survey: ransomware attacks prevention, monitoring and damage control. Int. J. Res. Sci. Innov4(15), pp.116-121. Available at: A_Comprehensive_Survey_Ransomware_Attacks_Prevention__Monitoring_and_Damage_Control-libre.pdf (d1wqtxts1xzle7.cloudfront.net). [Last Accessed 28th of May 2023]

Kamruzzaman, A., Ismat, S., Brickley, J.C., Liu, A. and Thakur, K., 2022, December. A Comprehensive Review of Endpoint Security: Threats and Defenses. In 2022 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1-7). IEEE. Available at: A Comprehensive Review of Endpoint Security: Threats and Defenses | IEEE Conference Publication | IEEE Xplore. [Last Accessed 28th of May 2023]


 

Comments

Popular Posts