Análisis y técnicas de prevención ante ataques Ransomware
This research project is focused on the analysis of ransomware attacks and ways to counteract it. Ransomware is a type of malware that encrypts data making it inaccessible and to decrypt it the cyberattackers pay a ransom, usually economic. The project consists of 4 parts and it is proposed first to...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | bachelorThesis |
| Language: | spa |
| Published: |
2021
|
| Subjects: | |
| Online Access: | https://repositorio.uteq.edu.ec/handle/43000/6583 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | This research project is focused on the analysis of ransomware attacks and ways to counteract it. Ransomware is a type of malware that encrypts data making it inaccessible and to decrypt it the cyberattackers pay a ransom, usually economic. The project consists of 4 parts and it is proposed first to carry out a compilation of studies related to ransomware attacks using meta-analysis. Subsequently, the most common ransomwares and the characteristics of the attacks by location, type of companies, economy and software are known. In this part, the impact of ransomware at a global level is statistically detailed. In the third part, a WannaCry ransomware attack, considered the most common, is simulated in a virtual machine, and the infection and data encryption process is also detailed. Finally, the information obtained is used to create a compendium containing small techniques for the prevention, detection and mitigation of ransomware attacks. With the purpose of helping people The research project is concluded with the results, discussion, conclusions and recommendations. A total of 35 studies were selected by the selection criteria. 16 for ransomware types and 19 for other attack characteristics. The studies were collected from Scopus and Google Scholar. The most common types of ransomware attacks according to the studies and the impact on the business, economic and industrial sector were known. In the third stage, a virtual computer was infected to learn first-hand how ransomware is established. Finally, a set of good practices to prevent ransomware and to deepen cybersecurity is developed. Keywords: ransomware, cybersecurity, meta-analysis, simulation, compendium. |
|---|