| Assessment Details and Submission Guidelines | |||||||||
| Unit Code | MN502 | ||||||||
| Unit Title | Overview   of Network Security | ||||||||
| Assessment Type | Individual   Assessment | ||||||||
| Assessment Title | Potential   threats and mitigation tools for ransomware (Assignment one) | ||||||||
| Purpose  of | the | Students   should be able to demonstrate their achievements in the following | |||||||
| assessment | (with | unit learning   outcomes: | |||||||
| ULO Mapping) | b. Analyse and   discuss common emerging threats, attacks, mitigation | ||||||||
| and   countermeasures in networked information systems | |||||||||
| Total Marks | 60 | ||||||||
| Word limit | 1500   – 2000 | ||||||||
Assignment Description
The security remains a challenge in networked information systems. One of the fastest evolving malware is ransomware. The ransomware embeds itself onto the computer in such a manner that it cannot be segregated, and even rebooting causes the ransomware to launch malicious code again. A ransomware continues to be a serious threat to the network users.
Assume you have an interview for the ransomware analyst position with Regal Security Solutions company. You are supposed to be prepared about the ransomware, their types, threats, and mitigation tools. In this context write a report including the following sections:
A.   Introduction about ransomware and their impacts on the society
B.   Discussion of any five variants of ransomware (Consider some recently developed ransomware)
C.   The working mechanism of ransomware
D.   Potential threats posed by ransomware
E.    Case study of at least one recent attack carried out by the ransomware
F.    Recommendations on any two mitigation tools to tackle the ransomware attack and discuss the effectiveness of the selected tools
G.   Summary
H.   References in IEEE Transactions on Networking style
Marking Criteria for the Assignment 1:
Marks are allocated as described in the following table.
| Sections No. | Description of the section | Marks | |
| Introduction | Introduction   about ransomware and their impacts on the | 05 | |
| society | |||
|  | Introduction about ransomware | ||
|   The impact of ransomware on the society | |||
|  | The report outline | ||
| Variants   of | Discuss   any five variants of ransomware (Consider some | 10 | |
| Ransomware | recently   developed ransomware) | ||
|  | Draw taxonomy | ||
|   Discuss the selected ransomware | |||
| Working | The   working mechanism of ransomware | 05 | |
| Mechanism |   Discuss the working mechanism of ransomware   with | ||
| proper citation | |||
| Potential | Potential   threats posed by ransomware | 10 | |
| Threats |  | System lockup | |
|   Encrypting and deleting the files | |||
| Recent | Case study of one recent attack carried out by the   ransomware | 05 | 
| Attack | during   2017-2018 period. | |
| Mitigation | Recommend  any    two  mitigation  tools    to  tackle  the | 15 | 
| Tools | ransomware   attacks and discuss the effectiveness of these | |
| tools | ||
|   Discuss any two mitigation tools | ||
|   Discuss the effeteness of selected   mitigation tools in | ||
| terms of   response time and resolution time | ||
| Summary | Summary | 05 | 
|   Summarise the overall contributions of the   report | ||
| References | References | 05 | 
|   Must consider at least five current   references from | ||
| journal/conference   papers and books. | ||
|   Must follow IEEE Transactions on Networking   style | ||
| Total   Marks | 60 | 
 To get solution visit our website www.sourceessay.com
Source: New feed