SlideShare ist ein Scribd-Unternehmen logo
1 von 16
SHEKHAWATI INSTITUTE OF
ENGINEERING AND
TECHNOLOGY
A Seminar Presentation
On
RANSOMWARE
Submitted to:-
Mrs. Suman Singh
HOD of CSE Dept.
Submitted by:-
Vikash Saini
B.Tech CSE 8th sem
CONTENTS
 What is Ransomware?
 Impact of this attack
 Some Facts About Ransomware
 Bitcoins
 TOR (Anonymity Network)
 If you're a victim, should you pay the ransom?
 Ransomware infection
 How to protect yourself?
 Conclusion
WHAT IS RANSOMWARE?
 It is a type of malware that restricts access to the
infected computer system in some way, and demands
that the user pay a ransom to the malware operators to
remove the restriction.
 This malware locked all the data in the computer and
displayed a message.
 demanding a ransom in exchange to unblock the data.
IMPACT OF THIS ATTACK
 WannaCry shutdown many businesses across the globe, including
the European manufacturing plants of automotive giants Nissan
 $17,000 Amount paid by the Hollywood Presbyterian Medical
Center in 2016 to unlock files and return to business as usual.
 209 million Amount paid in 2016 to cyber-criminals using
ransomware
 On 12 May 2017, a massive ransomware attack
occurred across a wide range of sectors, including
health care, government, telecommunications and
gas.
 WannaCry has spread to over 300,000 systems in
over 150 countries
Some Facts About Ransomware
 TYPICAL RANSOMWARE SOFTWARE USES RSA
2048 ENCRYPTION TO ENCRYPT FILES.
AN AVERAGE DESKTOP COMPUTER IS
ESTIMATED TO TAKE AROUND 6.4
QUADRILLION YEARS TO CRACK AN RSA 2048
KEY.
BITCOINS
Bitcoins are a form of cryptocurrency, meaning
they do not have a physical representation.
they are stored in anonymous digital wallets.
They can be transferred anywhere in the world via
the Internet. They can be paid from anywhere, to
anywhere with total anonymity.
TOR (ANONYMITY NETWORK)
 TOR, which stands for “The Onion Router” is a network
and browser developed to enhance and anonymize
Internet traffic.
 All traffic is encrypted .
 developed by the U.S. Naval Research Laboratory and
Defense Advanced Research Projects Agency (DARPA).
IF YOU'RE A VICTIM, SHOULD YOU
PAY THE RANSOM?
 Never pay Ransom.
 The best option is to restore the data from backup.
 try decrypting the files using recovery tools.
 Work with data recovery experts who can reverse engineer
malware and help gain access to your data.
RANSOMWARE INFECTION
 Opens an infected email attachment
 Clicks on an infected link
 Installs an infected app – from a third-party app store
 Visits a legitimate website that has been infected
HOW TO PROTECT YOURSELF?
 Update your Windows software to the latest edition.
 Backing up data is key! Make a copy and secure it.
 Scan your systems for viruses and malwares using the latest
anti-virus software in the market.
 To protect against WannaCry, apply the latest Microsoft
security patches.
 Backup all your data and store it in a secure
location.
 Scan all outgoing and incoming emails with
attachments.
 Update anti-virus software and conduct regular
scans.
 Spread awareness among employees to identify
scams, malicious links and emails.
 Segment the company network
CONCLUSION
 Ransomware is a type of malicious
software from cryptovirology that threatens to publish the
victim's data or perpetually block access to it unless a ransom is
paid
 more advanced malware uses a technique called cryptoviral
extortion, in which it encrypts the victim's files, making them
inaccessible, and demands a ransom payment to decrypt them.
seminar report on What is ransomware
seminar report on What is ransomware

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
Ransomware
RansomwareRansomware
Ransomware
 
Adware
AdwareAdware
Adware
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
pegasus spyware
pegasus spywarepegasus spyware
pegasus spyware
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is malware
What is malwareWhat is malware
What is malware
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 
Wannacry-A Ransomware Attack
Wannacry-A Ransomware AttackWannacry-A Ransomware Attack
Wannacry-A Ransomware Attack
 

Ähnlich wie seminar report on What is ransomware

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 

Ähnlich wie seminar report on What is ransomware (20)

What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
Wannacry Virus
Wannacry VirusWannacry Virus
Wannacry Virus
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Escan advisory wannacry ransomware
Escan advisory wannacry ransomwareEscan advisory wannacry ransomware
Escan advisory wannacry ransomware
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
What is Ransomware? How To Prevent It
What is Ransomware? How To Prevent ItWhat is Ransomware? How To Prevent It
What is Ransomware? How To Prevent It
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 

Mehr von Jawhar Ali

Mehr von Jawhar Ali (20)

seminar report on Sql injection
seminar report on Sql injectionseminar report on Sql injection
seminar report on Sql injection
 
seminar report on kingapp application
seminar report on kingapp applicationseminar report on kingapp application
seminar report on kingapp application
 
seminar report on school management system
seminar report on school management systemseminar report on school management system
seminar report on school management system
 
seminar presentation on apache-spark
seminar presentation on apache-sparkseminar presentation on apache-spark
seminar presentation on apache-spark
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense Technology
 
Powerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technologyPowerpoint presentation on 5G wireless technology
Powerpoint presentation on 5G wireless technology
 
powerpoint presentation on Google glass
powerpoint presentation on Google glasspowerpoint presentation on Google glass
powerpoint presentation on Google glass
 
Table Of Contents Google Glass
Table Of Contents Google GlassTable Of Contents Google Glass
Table Of Contents Google Glass
 
introduction and abstract on Google Glass Major report
introduction and abstract on  Google Glass Major reportintroduction and abstract on  Google Glass Major report
introduction and abstract on Google Glass Major report
 
Candidate declaration on Google Glass
Candidate declaration on Google GlassCandidate declaration on Google Glass
Candidate declaration on Google Glass
 
front Page on Google Glass
 front Page on Google Glass front Page on Google Glass
front Page on Google Glass
 
Table of contents on blood bank management system
Table of contents on blood bank management systemTable of contents on blood bank management system
Table of contents on blood bank management system
 
List of figures in Blood bank management system
List of figures in Blood bank management systemList of figures in Blood bank management system
List of figures in Blood bank management system
 
Full report on blood bank management system
Full report on  blood bank management systemFull report on  blood bank management system
Full report on blood bank management system
 
Cand declaration
Cand declaration Cand declaration
Cand declaration
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developing
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 

seminar report on What is ransomware

  • 1. SHEKHAWATI INSTITUTE OF ENGINEERING AND TECHNOLOGY A Seminar Presentation On RANSOMWARE Submitted to:- Mrs. Suman Singh HOD of CSE Dept. Submitted by:- Vikash Saini B.Tech CSE 8th sem
  • 2. CONTENTS  What is Ransomware?  Impact of this attack  Some Facts About Ransomware  Bitcoins  TOR (Anonymity Network)  If you're a victim, should you pay the ransom?  Ransomware infection  How to protect yourself?  Conclusion
  • 3. WHAT IS RANSOMWARE?  It is a type of malware that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction.  This malware locked all the data in the computer and displayed a message.  demanding a ransom in exchange to unblock the data.
  • 4.
  • 5. IMPACT OF THIS ATTACK  WannaCry shutdown many businesses across the globe, including the European manufacturing plants of automotive giants Nissan  $17,000 Amount paid by the Hollywood Presbyterian Medical Center in 2016 to unlock files and return to business as usual.  209 million Amount paid in 2016 to cyber-criminals using ransomware
  • 6.  On 12 May 2017, a massive ransomware attack occurred across a wide range of sectors, including health care, government, telecommunications and gas.  WannaCry has spread to over 300,000 systems in over 150 countries
  • 7. Some Facts About Ransomware  TYPICAL RANSOMWARE SOFTWARE USES RSA 2048 ENCRYPTION TO ENCRYPT FILES. AN AVERAGE DESKTOP COMPUTER IS ESTIMATED TO TAKE AROUND 6.4 QUADRILLION YEARS TO CRACK AN RSA 2048 KEY.
  • 8. BITCOINS Bitcoins are a form of cryptocurrency, meaning they do not have a physical representation. they are stored in anonymous digital wallets. They can be transferred anywhere in the world via the Internet. They can be paid from anywhere, to anywhere with total anonymity.
  • 9. TOR (ANONYMITY NETWORK)  TOR, which stands for “The Onion Router” is a network and browser developed to enhance and anonymize Internet traffic.  All traffic is encrypted .  developed by the U.S. Naval Research Laboratory and Defense Advanced Research Projects Agency (DARPA).
  • 10. IF YOU'RE A VICTIM, SHOULD YOU PAY THE RANSOM?  Never pay Ransom.  The best option is to restore the data from backup.  try decrypting the files using recovery tools.  Work with data recovery experts who can reverse engineer malware and help gain access to your data.
  • 11. RANSOMWARE INFECTION  Opens an infected email attachment  Clicks on an infected link  Installs an infected app – from a third-party app store  Visits a legitimate website that has been infected
  • 12. HOW TO PROTECT YOURSELF?  Update your Windows software to the latest edition.  Backing up data is key! Make a copy and secure it.  Scan your systems for viruses and malwares using the latest anti-virus software in the market.  To protect against WannaCry, apply the latest Microsoft security patches.
  • 13.  Backup all your data and store it in a secure location.  Scan all outgoing and incoming emails with attachments.  Update anti-virus software and conduct regular scans.  Spread awareness among employees to identify scams, malicious links and emails.  Segment the company network
  • 14. CONCLUSION  Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid  more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.