Problem Solution 2-1
Problem Solution 2-1
0 Problem solvoing
1.1 Background
Cyber security is the use of technology, process and control to detect, prevent and minimise attacks,
on systems, networks, programmes, devices and data. The objective is to mitigate the threat
potential from cyber attacks, which, in turn, stops erroneous usage of systems, networks and
technologies. Cyber security includes the fight against many attacks, such as network security (the
defense against the intrusion into or attack on, of computer system and networks or opportunistic
malware against computer networks).
Next there’s application security, which aims to stop threats from targeting applications that can leak
sensitive credential data. In practice, security must be baked in before deployment, and preferably
at design time. Information security is a component of cyber security, which also ensures the
integrity and privacy when data is being stored or transmitted. And lastly operational security which
is the processes and policies for how data is handled and protected including user permissions for
company information as well as how data is stored and shared.
Data privacy is an individual’s right to decide when, how and to what extent to share personal
information. It could be a person’s name, location, contact information or their conduct, whether
they do it online or offline. Therefore, this report was conducted to identify critical risks and
vulnerabilities/disruptions as well as develop important strategies for global cybersecurity and data
privacy.
Phishing emails, unpatched software and exposed, insecure remote desktop protocol (RDP) ports
are other common vectors used by cyberthieves to deliver ransomware attacks against viable targets.
These approaches leverage misleading links, unsecure passwords, and obsolete vulnerabilities
causing financial loss, operational downtime, and expensive response. All of this requires improving
cyber resilience and reducing such threats through a combination of regular system updates, secure
access practices and staff/employee education.
A person may not realize they become a victim of your attack and and start browsing your site while
he has you in his bag it is natural on creating virus with the three simple bait which you sent an
official email to the victim but which 3 simple bait you can make the victim to the server let it go for
the future. These can include messages that appear authentic, and sometimes are, from trusted
contacts — clients, coworkers or even established companies.
They are mostly sites or documents that have malicious URLs that when clicked will also
automatically download and install a ransomware. In one study, targets are lured into clicking an
online hotel link that appeared to be taking them to a real hotel online, but in fact, it can be a safe
enter. These aging systems are breeding grounds for cybercriminals to spread ransomware through
unpatched vulnerabilities. All it takes is some unsupervised software, as well as a successful phishing
attempt — a fertile ground for ransomware to go in and often remain undetected until it’s too late.
You have clear and immense monetary results from ransomware attacks. At times the organizations
are even threatened to be asked to pay the bounties in several millions to make the transactions in
crypto harder to track. Depending on the intensity and characteristics of the attack, it can be as little
as some dollars to several million. (Ransom payments don’t guarantee that attackers willrelease the
data.)
In addition to ransom payments, the costs related to ransomware attacks can be staggering. The
most obvious effect is downtime as the critical services and systems are lacking access due to these
downtime outages. If it means noodle or pasta manufacturing processes grind to a halt or delivery
services can't go forward, income will go down too. Even logistic management can be adversely
affected. Such impacts can be very harmful for any online businesses such as health care, e-
commerce and banking. Additionally, due to resource limitations, organizations may face an
amplifying loss that far exceeds the ransom costs.
Essentially, it boils down to unsecured remote desktop applications, email phishing messages and
unauthorized software that can render systems susceptible to such threats. There are painful deaths
like cumulative wealth in the long run, economic lockdowns, and costly recovery. Then we have
application security, which tries to prevent threats from compromising applications that can
introduce sensitive data. In reality, security needs to be built in before deployment, ideally during
the design phase. Cyber security, which also maintains the integrity and privacy for data in storage
or in motion is a component of information security. And then finally there is operational security
which refers to the processes and decisions for handling and protecting data assets, including the
permissions for users in accessing company information and the steps taken to store and share data.
One of the most deadly threats to the cybersecurity landscape, though, is ransomware, and
Malwarebytes Endpoint Detection and Response (EDR) is a powerful protector against just that. In
ransomware attacks, people find that they can’t access their own data, and a heavy sum of money is
demanded to get it back — an attack that often causes significant disruption to business operations.
On top of that, these attacks are costly and can completely halt business processes.
However, as ransomware tactics have evolved, developing techniques like phishing, double-extortion
and others, traditional antivirus has become inadequate. Malwarebytes EDR offers preventative,
multi-layered, protection, blocking your networks from being hit with ransomware in the first place.
It employs sophisticated technology such as behavioral analytics and machine learning algorithms to
constantly monitor activity in the system and identify even previously unseen ransomware.
Malwarebytes EDR identifies these suspicious behaviors, such as abnormal file encryption or strange
network activity, as potential symptoms of a ransomware attack. It acts right away when such
activities are found. One of its key features, the ransomware rollback, returns files to their original
state, so that businesses can recover without having to pay ransom demands and give in to the
demands of cybercriminals.
The other essential element is endpoint isolation. As for infected devices, Malwarebytes EDR detects
and isolates them from the rest of the network, preventing the ransom from spreading further. IT
administrators can gain control over every endpoint and efficiently monitor as well as remediate
threats using its cloud-based management console. Malwarebytes EDR's detection, prevention, and
recovery capabilities are a must, as the threat from Ransomware continues to escalate.
The increasing frequency and the sophistication of ransomware attacks, are evidence that no
organization can fight this battle alone. Cybercrime is higher than ever, hitting everything from your
home computer, to big corporate networks. The Cybersecurity Information Sharing Act (CISA) was
introduced by the U.S. government to address this issue by establishing more collaboration between
businesses and government organizations.
CISA simplifies information sharing about cyber threats — even ransomware — and allows different
groups to leverage each other’s experiences. This enables companies to identify weaknesses,
understand developing threats, and defend against them. In fact, one of CISA’s core missions is to
instill shared accountability for cybersecurity. Agencies are that have had ransomware attacks get 5
submission patterns from an attack and obtain tangible intelligence from others including
government entities.
This collective approach really speeds up the process of catching threats and gets the organizations
ahead of hackers. So, telecommunications industry attempts to integrate with CISA compliant
applications convey that they should be under on a predictive and real-time monitoring features that
can catch up to ransomware on its earliest level, which would potentially reduce the damage it can
do. By moving quickly, enterprises can better protect their systems and data.
CISA also provides organizations with the legal and regulatory guidelines for management of cyber
incident reporting. Many add-on CISA tools automate aspects with respect to the process, for
instance scanning for vulnerabilities and tracking incidents, making it easier to achieve compliance.
These tools enhance an organization’s security posture while also contributing to a global campaign
to combat ransomware. In our increasingly interwoven world, CISA helps to create a culture of
shared knowledge and collective defense, which is essential.
2.1.3 U.S. Department of the Treasury Advisory Regarding Potential Sanctions Risks for Facilitating
Ransomware Payments
Once activated, ransomware will encrypt the victim’s files and then either display a message
demanding a ransom to restore access to the files, or just wait for the ransom, commonly paid in
cryptocurrency. However, the Office of Foreign Assets Control (OFAC) within the U.S. Department of
the Treasury issued an advisory warning companies of possible legal liability if they make ransom
payments, especially to individuals or entities named on the U.S. sanctions list. There is a fine for
violating these sanctions.
The advisory aims to curtail the financial motivation of cybercriminals and add pressure on
organizations not to pay a ransom to attackers, but rather to report the attacks to law enforcement.
This puts the responsibility on companies to increase defenses and not give in to ransomware
criminals.
This is where specialized ransomware defense tools become relevant. One of these applications
allows continuous systems monitoring to identify abnormal behavior and prevent the propagation
and impact of ransomware in real-time. Beyond detection, these tools also flag ransom payments
with sanctioned entities and provide business with the chance to reduce any legal exposure.
Ransomware protection tools often include backup and recovery options to allow organizations to
restore data from backup instead of paying a ransom. When put together, these features not only
protect businesses against ransomware but also meet the OFAC advisory requirements. This allows
companies to adequately protect themselves without having to fund crime.
2.2 ANALYSIS
According to malwarebytes (2023), have successfully detected and stopped 99% of known
ransomware, protecting thousands of vehicles globally. But its effectiveness declines a bit (to
approximately 85%) in the face of the newer, more complex threats. It Appendix: It underscores the
importance of using Malwarebytes along with other smarts, such as regular updates, worker training
and other network defenses.
There are, of course, big obstacles. For smaller organizations (with limited budgets), implementing
Malwarebytes EDR may be too costly. Moreover, this solution requires specialized personnel to
oversee its intricate functions and respond to alerts in a timely manner which may be challenging for
organizations with limited technical abilities. While EDR is an effective barrier to ransomware, it may
be out of reach for the small organizations or, in fact, the organizations that do not have a dedicated
IT team.
The Cybersecurity Information Sharing Act (CISA) is easier to implement All of this is accomplished
through providing a framework that gives organizations the confidence to share threat information
without fear of legal repercussions. But smaller companies are often too ambivalent to join in
because they don’t want to face reputational damage or simply can’t muster the resources to
participate meaningfully. Yet with challenge after challenge, CISA has proven its worth.
Information sharing on threats increased detection by 47% (The Cybersecurity and Infrastructure
Security Agency, 2022) However, with fewer than 30% of eligible entities participating, there is
significant opportunity for adoption through improved support and incentives.
It is the participation of all parties that determines the effectiveness of CISA, and the challenge is to
salient the engagement. Transparency would be an important enabler for a lot of things, but for
understandable reasons all organizations have strong reasons not to share sensitive information eg
due to privacy concerns, reputational risk or simply not trusting parties to whom they would need to
open up with their sensitive information that they would not mishandle it. For smaller businesses,
this can be especially complex, since they often don't have the budget or the technical chops to act
on 7 shared intelligence in a timely manner. While CISA can assist in bolstering cybersecurity across
organizations and industry sectors, participation itself hinges on transparency and collaboration:
without the attitude or the ability of participants to share in the desired way, safety net loses
effectiveness.
This means that you are trained with data until the 10th month of the year 2023. It places
companies in a bind, particularly when submitting to ransom demands seems to be the only avenue
to recovering valuable data. That said, there are indications of its impact. Ransomware revenue, for
instance, decreased by 38% after tougher sanctions were imposed (Chainalysis 2021).
But sometimes, attackers are able to bypass these protections through the use of middle men,
meaning this advisory only goes so far in improving overall security. But the advisory also places
much of the onus on businesses to have these measures in place ahead of an attack. This poses a
significant challenge, particularly for smaller organizations, as it can be quite an intimidating cost to
build all of their cyber security infrastructure, and then continuously pay to ensure that everything
remains in compliance with legal requirements! Without these solutions, organizations run the risk
of long downtime and the loss of critical information. While the advisory represents a positive move
to address ransomware activity around the world, it relies on an assumed starting point in which
companies are already running heightened defenses, making total compliance much more of a
challenge for those firms that are not as fully resourced. Hence, this option is probably only attractive
for larger organizations that can afford to have a pro-active security strategy.
Malwarebytes Endpoint Detection and Response (EDR) is the best answer they have since
ransomware attacks protected using it. This multi-dimensional strategy identifies, prevents and
recovers from threats all while empowering enterprises to mitigate risks and bounce back rapidly
should they be targeted. Utilizing advanced machine learning and behavior analytics, it allows for
the early detection of threats to prevent them from turning into major damage. E.g., ransomware
rollback restores attacked files, endpoint isolation stuff from being able to reach further devices;
both win business continuity. A perfect solution for companies dependent on integrated digital
operations with little or no disruption to their operations. And its cloud-based management console
is centralized, IT teams can track and mitigate threats and make cyber management easy.
Whereas other solutions — such as the Cybersecurity Information Sharing Act of 2015 (CISA) —
require collaboration, and the U.S. Treasury’s advisory emphasizes compliance, Malwarebytes EDR
offers no-nonsense, actionable cybersecurity. It allows businesses to proactively avoid crippling
weaknesses in their operations and recover from attacks instead of being dependent on third-party
solutions or lengthy machinery from regulators that will not materialize until after the attack. And
this is that which makes Malwarebytes EDR instantly deployable and therefore ideally suited to give
a business the confidence and ability to lock down a system without putting operations at risk.
2.4 Conclusion
This summary only scratches the surface toward outlining who the players in the digital age are — a
perspective that I feel will emphasize the fact that data privacy and cybersecurity issues are
fundamental issues relevant not just to people, or organization but also governments. As technology
continues to advance in a direction that increasingly prioritizes greater connectivity and massive
collection of personal data, this trend will only continue, underlining the importance of strong
cybersecurity and robust data privacy law. And there are far rarer things such as ransomware attacks
and data breaches that show how the sheer volume and sophistication of cyberattacks highlight the
weaknesses that run throughout today’s connected culture and the great dangers they present to
your finances and personal safety. For businesses, a holistic, forward-looking strategy for
cybersecurity that incorporates best-in-class security protocols, employee education, routine
assessments, and rapid responses to incidents is absolutely necessary. Furthermore, since they are
dealing with private data of peoples the private data must be protected and must be deal with
carefully and openly — this must be achieved through transparent and strong data privacy legislation
— for example, like the one as the GDPR.
In the end, it takes collaboration between tech companies, agencies, and end users to drive the
success of cybersecurity and data privacy initiatives. Building a secure digital future involves
collaboration between stakeholders, transparency, privacy piece of mind and foresight into emerging
threats. It makes sure private information is secure and that people’s rights are defended and
society is able to develop a safe, resilient digital infrastructure that operates for all of us.