Análisis y técnicas de prevención ante ataques Ransomware

This research project is focused on the analysis of ransomware attacks and ways to counteract it. Ransomware is a type of malware that encrypts data making it inaccessible and to decrypt it the cyberattackers pay a ransom, usually economic. The project consists of 4 parts and it is proposed first to...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Zamora Baidal, Dustyn Josue (author)
مؤلفون آخرون: Triviño Franco, Anthony Stiven (author)
التنسيق: bachelorThesis
اللغة:spa
منشور في: 2021
الموضوعات:
الوصول للمادة أونلاين:https://repositorio.uteq.edu.ec/handle/43000/6583
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:This research project is focused on the analysis of ransomware attacks and ways to counteract it. Ransomware is a type of malware that encrypts data making it inaccessible and to decrypt it the cyberattackers pay a ransom, usually economic. The project consists of 4 parts and it is proposed first to carry out a compilation of studies related to ransomware attacks using meta-analysis. Subsequently, the most common ransomwares and the characteristics of the attacks by location, type of companies, economy and software are known. In this part, the impact of ransomware at a global level is statistically detailed. In the third part, a WannaCry ransomware attack, considered the most common, is simulated in a virtual machine, and the infection and data encryption process is also detailed. Finally, the information obtained is used to create a compendium containing small techniques for the prevention, detection and mitigation of ransomware attacks. With the purpose of helping people The research project is concluded with the results, discussion, conclusions and recommendations. A total of 35 studies were selected by the selection criteria. 16 for ransomware types and 19 for other attack characteristics. The studies were collected from Scopus and Google Scholar. The most common types of ransomware attacks according to the studies and the impact on the business, economic and industrial sector were known. In the third stage, a virtual computer was infected to learn first-hand how ransomware is established. Finally, a set of good practices to prevent ransomware and to deepen cybersecurity is developed. Keywords: ransomware, cybersecurity, meta-analysis, simulation, compendium.