Cyber Security Issue: Ransomware (Essay Sample)
Topic is Ransomware Purpose: This assignment is intended to help you learn to explore your topic from Modules 7 - 11. Consider the topics and outcomes presented in Modules 7 - 11. Choose a topic that interests you and email your prospective topic to your instructor for approval. Be sure that your topic is not too narrow or broad. Possible topics could include: a comparison and contrast of various security frameworks; an overview of a recent security breach in the context of an existing risk management framework; the implications of a newsworthy ethical violation that is security related; etc. Upon receiving written approval, research your topic. You must include at least four primary, peer-reviewed sources in your bibliography. Additional sources of varying standards can also be used. However, these four must be specifically cited. An uncited source should not appear in your bibliography. Write a 4 to 6-page research paper on your topic. The page count excludes any figures, tables, pictures, title page, front-matter, back-matter, appendices, or bibliographic references. In other words, there should be 4 to 6 pages of double-spaced prose. Proofread your assignment carefully. Improper English grammar, sentence structure, punctuation, or spelling will result in significant point deductions. Submit your paper by the due date indicated.
Cyber Security Issue: Ransom Ware
Student's Name
University
Course
Professor's Name
Date
Cyber Security Issue: Ransomware
As cyber security threats continue to increase and evolve in complexity in the 21st century, all organizations globally are finding antivirus installation necessary. Among the most cyber threats affecting computer systems of most organizations, today is Ransomware. Ransomware is a computer virus that modern cybercriminals use to limit users from full or partial access to their computers. Until the victim pays a specific amount of my to the attackers within a particular time, cybercriminals can use the virus mentioned above to access the user's sensitive personal or organizational information. They can temporarily block computer screens or specific files and send threats to information owners to get conditional payments. This essay will explore the historical overview of ransomware cyber threats' functioning, evolution, and prevention.
Other Topics:
- Advantages and disadvantages of computersDescription: In modern society, it is inevitable to be without computers. Computers' impact on our society is so huge, with almost every sector feeling the effect of computers. Computers are now almost becoming a basic need in our lives with the convenient ...2 pages/≈550 words| 3 Sources | APA | Technology | Essay |
- Data Validation in ExcelDescription: Data validation is an Excel feature that is utilized to regulate what can be entered into the cells by the user. Validation of data is the most significant step in data handling whether one is doing analysis or in the field collecting necessary information. ...3 pages/≈825 words| 1 Source | APA | Technology | Essay |
- Advantages and Disadvantages of ComputersDescription: The invention of computers is one of the greatest achievements in the world of technology. The idea of making a computer arose in the eighteenth century but only materialized in the early nineteenth century and was ...2 pages/≈550 words| 4 Sources | APA | Technology | Essay |