Ransomware is malicious software that encrypts files and requires a

 

Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.

Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.

Read these brief articles from the UMGC library to learn about the ransomware incidents:

Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).

Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).

If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.

Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.

  • What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?
  • Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.
  • If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?
  • If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?
  • Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?
  • Would you have a different decision if you were working for a small organization like Mercury USA?

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

social networking sites(Myspace, YouTube, Indabamusic, Second Life)

Write a critical essay incorporating key themes in the book, in doing so, compare it with one of the social networking sites that have not been discussed in the book. Has social networking site for musicians improved since then? What has changed and remained the same? 1) Pick social networking

Due Day 3 Think of a change in a company

  Due Day 3 Think of a change in a company with which you are familiar.  Respond to the following in a minimum of 175 words: Who were the stakeholders involved in this change? Discuss what concerns different stakeholders might have and how communication is needed to address those concerns. Due Day 7  ( will be

Descartes and Kant argue that higher level functional and rational

4. Regan claims that all sentient beings have interests, and as such, they are subjects of their own lives, whatever their characteristics or species membership. Evaluate the claim that having interests is necessary as well as sufficient for moral standing. In the course of your answer, feel free to refer

Instructions: You are to write a 4-5 page pape’r (not

 Instructions: You are to write a 4-5 page pape’r (not including the reference page) reflecting on learning points from your time in Communication 8: Group Discussion.  I have posed some questions below to help guide your thinking as you start your process.  You do not have to answer all or

Need APA format paper with detailed analysis of the following

Need APA format paper with detailed analysis of the following questions. *Must follow the assignment rubric* See attached PAGE 3 and 4 Chapter 9: 1. List nine ways of gaining access to external knowledge (discussed in section 5 of this chapter).What are the major issues that need to be considered

You will participate in this discussion in two ways: (We

  You will participate in this discussion in two ways: (We need discussions for 2 roles) 1st Role:  As an aide for one of the 22 Republican Senators who signed the letter to President Donald Trump and  2nd Role:  As an individual playing any of these roles as a responder

Q1- make comments on the attached Q2-Submit a rough draft

Q1- make comments on the attached   Q2-Submit a rough draft of your project implementation and closure plan to the Main Forum to receive feedback from peers. Read the documents posted by at least two of your peers and provide them with specific feedback on their project implementation and closure plan.

Evaluating and adapting practice – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

(250 words and References)What is the difference among morality, ethics, and the law? Provide an original example of each. Describe an instance whereby a decision may be ethical, but not moral. Why is Nursing Assignment Help

(250 words and References) What is the difference among morality, ethics, and the law? Provide an original example of each. Describe an instance whereby a decision may be ethical, but not moral. Why is it important for a healthcare leader to understand the differences among these? Expert Solution Preview Introduction:

Choose one concept, research finding, or question that stood out

  Choose one concept, research finding, or question that stood out to you in your readings and content assigned for this week. Find an empirical research article about this that was published in the scientific literature and provide a summary of that article here answering the following questions. Attach the

Alchohol Anonymous (AA) is viewed by some as a “narrative

Alchohol Anonymous (AA) is viewed by some as a “narrative  and reflective community.” It has been hailed as best practice and supported by the government.  Yet, it has also been critiqued for poor success rates and its promotion of God and religious views.  -https://www.aacle.org/12-steps-original-manuscript/  Discuss the strengths and weaknesses of

Practical connection assignment (3 pages): This week select an organization

 Practical connection assignment (3 pages):  This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities: Name the organization and briefly describe what good or service they sell and where they operate.

Local problems are often just symptoms of larger global problems.

  Local problems are often just symptoms of larger global problems. Think for a moment about the social problem that you focused on for your Final Project. How has this problem manifested at the global level? As a social change agent, what can you do to address it? What tools

CRISPR/Cas9 gene editing Overview In this activity, you will consider

CRISPR/Cas9 gene editing Overview In this activity, you will consider how the analysis of your social, cultural, or global event where a technology plays a significant role might have turned out differently if you looked at it through a different lens. You will also consider how your critical analysis can

1-You will first identify an organization, an important IT system

  1-You will first identify an organization, an important IT system or application used within the organization, and potential security risks and threats to the system.   2-  Building upon the work in Part 1, you will now investigate technologies, policies or practices that will help mitigate the security threats and