Case Study (Discussion)
Many researchers have discussed the negative impact it had in many countries. A study by Tailor and Patel (2017) states that with the presence of a decryption key, it will be easier to break encryption. Although, most of the resources lacked how the process was carried out. Furthermore, these malicious programs could have been spotted, identified, and prevented from operating on endpoints through an efficient endpoint security solution, avoiding the encryption of files and the resulting ransom demand.
Reference List:
Tailor, J.P. and Patel,
A.D., 2017. A comprehensive survey: ransomware attacks prevention, monitoring
and damage control.Int.J.Res.Sci.Innov,4(15),pp.116-121 . Availableat: A_Comprehensive_Survey_Ransomware_Attacks_Prevention__Monitoring_and_Damage_Control-libre.pdf
(d1wqtxts1xzle7.cloudfront.net). [Last Accessed 28th of May 2023]
Comments
Post a Comment