Análisis y técnicas de prevención ante ataques Ransomware

This research project is focused on the analysis of ransomware attacks and ways to counteract it. Ransomware is a type of malware that encrypts data making it inaccessible and to decrypt it the cyberattackers pay a ransom, usually economic. The project consists of 4 parts and it is proposed first to...

詳細記述

保存先:
書誌詳細
第一著者: Zamora Baidal, Dustyn Josue (author)
その他の著者: Triviño Franco, Anthony Stiven (author)
フォーマット: bachelorThesis
言語:spa
出版事項: 2021
主題:
オンライン・アクセス:https://repositorio.uteq.edu.ec/handle/43000/6583
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
その他の書誌記述
要約:This research project is focused on the analysis of ransomware attacks and ways to counteract it. Ransomware is a type of malware that encrypts data making it inaccessible and to decrypt it the cyberattackers pay a ransom, usually economic. The project consists of 4 parts and it is proposed first to carry out a compilation of studies related to ransomware attacks using meta-analysis. Subsequently, the most common ransomwares and the characteristics of the attacks by location, type of companies, economy and software are known. In this part, the impact of ransomware at a global level is statistically detailed. In the third part, a WannaCry ransomware attack, considered the most common, is simulated in a virtual machine, and the infection and data encryption process is also detailed. Finally, the information obtained is used to create a compendium containing small techniques for the prevention, detection and mitigation of ransomware attacks. With the purpose of helping people The research project is concluded with the results, discussion, conclusions and recommendations. A total of 35 studies were selected by the selection criteria. 16 for ransomware types and 19 for other attack characteristics. The studies were collected from Scopus and Google Scholar. The most common types of ransomware attacks according to the studies and the impact on the business, economic and industrial sector were known. In the third stage, a virtual computer was infected to learn first-hand how ransomware is established. Finally, a set of good practices to prevent ransomware and to deepen cybersecurity is developed. Keywords: ransomware, cybersecurity, meta-analysis, simulation, compendium.