Assignment 2: Malicious Software CSE1ICB Introduction to Cybersecurity latrobe.edu.au ASSIGNMENT Instructions • Please submit via CSE1ICB LMS page Assignment submission section • This assignment is...

1 answer below »
Assignment 2: Malicious Software CSE1ICB Introduction to Cybersecurity latrobe.edu.au ASSIGNMENT Instructions • Please submit via CSE1ICB LMS page Assignment submission section • This assignment is due on Monday 11th April 2022 before 11.59 pm. • You must submit your assignment only as a PDF file. • Please write your full name and student number on the top of the first page. Assignment problem Malicious software (malware) has been a fixture of the cybersecurity landscape for decades. The target, technology, and impact of malware has changed over the years, but it remains a common tactic used by cybercriminals to cause harm to both individuals and businesses. Security researchers across the world dissect and analyse each large malware outbreak, and a lot of their findings are publicly accessible on the Web. Several (in)famous malware samples are listed in the table below, along with a sample article describing their outbreak. Select one of the samples provided (or choose one of your own from your research) and answer the following questions relating to the malware and its outbreak in the wild. 1. What type of malware is it (worm, trojan, etc.)? Briefly describe what distinguishes this malware type from others. 2. What was the intent behind this malware, and who were its targets? 3. Briefly describe what vulnerabilities this malware exploited to infect its target systems. 4. What negative impact did this malware have on its victims and/or their systems? Assignment guidance You should use between 500 and 1000 words in total to answer these questions. This assignment is weighed 20% of the overall subject marks. The marking rubric is given below. Referencing and citation should use APA format. You should research other sources of information from reputable online resources such as malware research groups, security vendors, security journalists and academic papers if possible. Malware Link MyDoom (2004) https://www.f-secure.com/v-descs/novarg.shtml Stuxnet (2010) https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet WannaCry (2017) https://www.kaspersky.com.au/resource-center/threats/ransomware
Answered 7 days AfterMar 29, 2022

Answer To: Assignment 2: Malicious Software CSE1ICB Introduction to Cybersecurity latrobe.edu.au ASSIGNMENT...

Shubham answered on Apr 06 2022
92 Votes
Running Head: COMPUTER NETWORK SECURITY                    1
COMPUTER NETWORK SECURITY                            6
COMPUTER NETWORK SECURITY
ASSIGNMENT 2: MALICIOUS SOFTWARE
Table of Contents
Answer to Question 1    3
Answer to Question 2    4
Answer to Q
uestion 2    5
Answer to Question 4    6
References    7
Answer to Question 1
WannaCry is a crypto ransomware worm that was made to carry an attack on Microsoft PCs (NCCIC, 2017). It can be spread form PC to PC thus classified as under worm component. The WannaCry malware is programmed in such a manner that it can encrypt the critical files. Malwares normally bore deep into systems by cracking weak passwords and spread rapidly through networks.
They are known for creating disruption in daily operations. They prompt the user to click on them as they carry files and attachments or divert the user to some scammy website, which contains malware attack (Kaspersky, 2019). It is the major cause of cyber-attacks and data breaches, which leads to fraud and identity theft. It can attack any organisations individuals, government institutions or business houses.
WannaCry is different from other malwares as not all malwares demands ransom. It attacks SMB (Server Message Block) protocol exploiting the vulnerabilities of arbitrary code during execution. It first attacks with URL, if the purpose is not solved then search for and attacks encrypted files such as MKVs and MP3 and make them inaccessible to user.
After this it displays the message, that $300 is due to pay for decrypt files (Kaspersky, 2019). It is flashed as ransom message. It is designed in such a manner that it steal the data from the Windows PC and the cybercriminals ask for ransom in the form of Bitcoin or crypto currency from the user. An illustration of how ransom message flash on screen
Answer to Question 2
The intent behind the ransomware is to blackmail the victims and extort money from them. The charges are fixed, which are asked. For instance, victims need to pay $300 within 3 days or $600 within 7 days (CSO, 2018). It also flashes message that if amount is not paid in stipulated time then the data could be considered as lost. It uses Blockchain technology for Bitcoin payments as it maintains the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here