Näytä suppeat kuvailutiedot

What is a ransomware and how does it work?

Lamsouber, Luca (2023)

dc.contributor.authorLamsouber, Luca
dc.date.accessioned2023-11-15T06:49:02Z
dc.date.available2023-11-15T06:49:02Z
dc.date.issued2023-
dc.identifier.urihttp://www.theseus.fi/handle/10024/810033
dc.description.abstractThe purpose of this bachelor’s thesis was to create an educational guide about ransomware for organizations as well as other individuals, which raises awareness in defending against ransomware attacks. In this thesis a well-known ransomware called “Black Basta” was investigated and analyzed. One objective was to compile a comprehensive theoretical framework about malware, focusing on ransomware, which provides the necessary foundation for later understanding how ransomware attacks work. Another goal was to examine what happens when a ransomware gets detonated. The theoretical part of this thesis answers to questions such as what malware are, how do they differ from other malware, how do ransomware work. This part also goes through the process of a ransomware attack and how attackers succeed in a ransomware attack. The empirical part of this thesis was done with qualitative methods. It further inspects the topic on a practical level to truly gain an understanding about ransomware. The outcome of this thesis was successful since an educational guide that answers to each research questions with theoretical or practical examples was compiled. As ransomware attacks evolve rapidly, it is essential to be up to date with this subject and the tactics, techniques, and procedures that the cyber attackers use. This thesis can be used for this purpose of teaching organizational staff or other individuals wanting to be aware on how to be prepared for a ransomware attack.-
dc.language.isoeng-
dc.rightsfi=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|sv=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|en=All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.|-
dc.titleWhat is a ransomware and how does it work?-
dc.type.ontasotfi=AMK-opinnäytetyö|sv=YH-examensarbete|en=Bachelor's thesis|-
dc.identifier.urnURN:NBN:fi:amk-2023111429393-
dc.subject.specializationKyberturvallisuus-
dc.subject.degreeprogramfi=Tietojenkäsittely|sv=Informationsbehandling|en=Business Information Technology|-
dc.subject.ysocyber attacks-
dc.subject.ysomalware-
dc.subject.ysocyber security-
dc.subject.disciplineTradenomi-
annif.suggestions.linkshttp://www.yso.fi/onto/yso/p27466|http://www.yso.fi/onto/yso/p5479|http://www.yso.fi/onto/yso/p2837|http://www.yso.fi/onto/yso/p1293|http://www.yso.fi/onto/yso/p26189|http://www.yso.fi/onto/yso/p10564|http://www.yso.fi/onto/yso/p12936|http://www.yso.fi/onto/yso/p5475|http://www.yso.fi/onto/yso/p27867|http://www.yso.fi/onto/yso/p1380en


Tiedostot

Thumbnail

Viite kuuluu kokoelmiin:

Näytä suppeat kuvailutiedot