Case Study (Conclusion)
The 2017
WannaCry Ransomware Attack, which had a detrimental impact on the entire world,
was widely acknowledged. As stated before, this attack could have been avoided
by using an intelligent endpoint security solution. Moreover, this is where my
major project comes as my major project is about endpoint security. Endpoint
security is a subfield in cybersecurity that protects entry points and
endpoints from being used by cybercriminals (Kamruzzaman et al., 2022). In
addition, understanding the dangers of ransomware and learning how to prevent
these attacks is very beneficial, considering that our world is constantly
evolving and almost everything is connected to technology. This research also
provides how this attack can occur. The primary goal of this study is to
highlight the risks and effects of ransomware.
Chen, Q. and Bridges, R.A., 2017, December.
Automated behavioral analysis of malware: A case study of wannacry ransomware.
In 2017 16th IEEE International
Conference on machine learning and applications (ICMLA) (pp. 454-460). IEEE. Available at: Automated
Behavioral Analysis of Malware: A Case Study of WannaCry Ransomware | IEEE
Conference Publication | IEEE Xplore. [Last Accessed 28th of May
2023]
Hsiao, S.C. and Kao, D.Y., 2018, February. The static
analysis of WannaCry ransomware. In 2018
20th international conference on advanced communication technology (ICACT) (pp. 153-158). IEEE. Available at: The
static analysis of WannaCry ransomware | IEEE Conference Publication | IEEE
Xplore. [Last Accessed 28th of May 2023]
Mohurle, S. and Patil, M., 2017. A brief study of
wannacry threat: Ransomware attack 2017. International
Journal of Advanced Research in Computer Science, 8(5),pp.1938-1940.Available
at: 2261f190e292ad93d6887198d7050dec.pdf
(sbgsmedia.in). [Last Accessed 28th of May 2023]
Tailor, J.P. and Patel,
A.D., 2017. A comprehensive survey: ransomware attacks prevention, monitoring
and damage control. Int. J. Res. Sci. Innov, 4(15), pp.116-121. Available at: A_Comprehensive_Survey_Ransomware_Attacks_Prevention__Monitoring_and_Damage_Control-libre.pdf
(d1wqtxts1xzle7.cloudfront.net). [Last Accessed 28th of May 2023]
Kamruzzaman, A.,
Ismat, S., Brickley, J.C., Liu, A. and Thakur, K., 2022, December. A
Comprehensive Review of Endpoint Security: Threats and Defenses. In 2022 International Conference on Cyber Warfare and Security
(ICCWS) (pp. 1-7). IEEE. Available at: A Comprehensive Review of
Endpoint Security: Threats and Defenses | IEEE Conference Publication | IEEE
Xplore. [Last Accessed 28th of May 2023]
Comments
Post a Comment