{"id":35,"date":"2024-08-24T16:54:01","date_gmt":"2024-08-24T16:54:01","guid":{"rendered":"https:\/\/compscigeeks.com\/blog\/?p=35"},"modified":"2024-12-13T09:26:04","modified_gmt":"2024-12-13T09:26:04","slug":"threat-management-ransomware","status":"publish","type":"post","link":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/","title":{"rendered":"Threat Management | Ransomware"},"content":{"rendered":"<p>Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.<\/p>\n<p>Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore\u2019s systems, as well as two smaller cities in Florida.<\/p>\n<p>Read these brief articles to learn about the ransomware incidents:<\/p>\n<p><a href=\"http:\/\/ezproxy.umgc.edu\/login?url=https:\/\/www-proquest-com.ezproxy.umgc.edu\/newspapers\/attacked-with-ransomware-baltimore-isnt-giving\/docview\/2229028131\/se-2?accountid=14580\" target=\"_blank\" rel=\"noopener\">Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn&#8217;t Giving In. New York Times, p. B6(L).<\/a><\/p>\n<p><a href=\"http:\/\/ezproxy.umgc.edu\/login?url=https:\/\/www-proquest-com.ezproxy.umgc.edu\/newspapers\/another-city-florida-pays-ransom-computer-hackers\/docview\/2248107897\/se-2?accountid=14580\" target=\"_blank\" rel=\"noopener\">Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).<\/a><\/p>\n<p>If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.<\/p>\n<p>Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.<\/p>\n<ul>\n<li>What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and\/or the smaller cities?<\/li>\n<li>Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.<\/li>\n<li>If you agree to pay the ransom, what are you going to tell the CEO if the hackers don\u2019t end up providing the decryption key to unlock the files or come back and ask for even more money?<\/li>\n<li>If you don\u2019t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?<\/li>\n<li>Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?<\/li>\n<li>Would you have a different decision if you were working for a small organization like Mercury USA?<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><a href=\"https:\/\/compscigeeks.com\/\" target=\"_blank\" rel=\"noopener\">Get Solution<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/\">Read More<span class=\"screen-reader-text\">Threat Management | Ransomware<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[74,72,76,75,14,73,71,11],"class_list":["post-35","post","type-post","status-publish","format-standard","hentry","category-computer-science-help","tag-cyberattack-defense","tag-cybersecurity-threats","tag-data-breach-prevention","tag-it-security","tag-malware-protection","tag-ransomware-prevention","tag-ransomware-protection","tag-threat-management","excerpt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat Management | Ransomware - Computer Science Help!<\/title>\n<meta name=\"description\" content=\"Ransomware is a type of malicious software that encrypts files, demanding a ransom, often in cryptocurrency, for decryption. Learn about how ransomware attacks work and the measures you can take to protect your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Management | Ransomware - Computer Science Help!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"Computer Science Help!\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-24T16:54:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-13T09:26:04+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#\\\/schema\\\/person\\\/9a0c49ef07b7aebe3139735b320670c3\"},\"headline\":\"Threat Management | Ransomware\",\"datePublished\":\"2024-08-24T16:54:01+00:00\",\"dateModified\":\"2024-12-13T09:26:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/\"},\"wordCount\":409,\"publisher\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#organization\"},\"keywords\":[\"Cyberattack Defense\",\"Cybersecurity Threats\",\"Data Breach Prevention\",\"IT Security\",\"Malware Protection\",\"Ransomware Prevention\",\"Ransomware Protection\",\"Threat Management\"],\"articleSection\":[\"Expert Help\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/\",\"url\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/\",\"name\":\"Threat Management | Ransomware - Computer Science Help!\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#website\"},\"datePublished\":\"2024-08-24T16:54:01+00:00\",\"dateModified\":\"2024-12-13T09:26:04+00:00\",\"description\":\"Ransomware is a type of malicious software that encrypts files, demanding a ransom, often in cryptocurrency, for decryption. Learn about how ransomware attacks work and the measures you can take to protect your data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/2024\\\/08\\\/24\\\/threat-management-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Management | Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/\",\"name\":\"CompSci Geeks\",\"description\":\"Expert Computer Science Assistance Anytime, Anywhere!\",\"publisher\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#organization\",\"name\":\"CompSci Geeks\",\"url\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/logo.png\",\"width\":152,\"height\":64,\"caption\":\"CompSci Geeks\"},\"image\":{\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/compscigeeks.com\\\/blog\\\/#\\\/schema\\\/person\\\/9a0c49ef07b7aebe3139735b320670c3\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09719ff5a504407daa733011a85e9b5033f6143b0f7da656bc694c0357afc281?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09719ff5a504407daa733011a85e9b5033f6143b0f7da656bc694c0357afc281?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09719ff5a504407daa733011a85e9b5033f6143b0f7da656bc694c0357afc281?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/compscigeeks.com\\\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat Management | Ransomware - Computer Science Help!","description":"Ransomware is a type of malicious software that encrypts files, demanding a ransom, often in cryptocurrency, for decryption. Learn about how ransomware attacks work and the measures you can take to protect your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Threat Management | Ransomware - Computer Science Help!","og_url":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/","og_site_name":"Computer Science Help!","article_published_time":"2024-08-24T16:54:01+00:00","article_modified_time":"2024-12-13T09:26:04+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/#article","isPartOf":{"@id":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/"},"author":{"name":"admin","@id":"https:\/\/compscigeeks.com\/blog\/#\/schema\/person\/9a0c49ef07b7aebe3139735b320670c3"},"headline":"Threat Management | Ransomware","datePublished":"2024-08-24T16:54:01+00:00","dateModified":"2024-12-13T09:26:04+00:00","mainEntityOfPage":{"@id":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/"},"wordCount":409,"publisher":{"@id":"https:\/\/compscigeeks.com\/blog\/#organization"},"keywords":["Cyberattack Defense","Cybersecurity Threats","Data Breach Prevention","IT Security","Malware Protection","Ransomware Prevention","Ransomware Protection","Threat Management"],"articleSection":["Expert Help"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/","url":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/","name":"Threat Management | Ransomware - Computer Science Help!","isPartOf":{"@id":"https:\/\/compscigeeks.com\/blog\/#website"},"datePublished":"2024-08-24T16:54:01+00:00","dateModified":"2024-12-13T09:26:04+00:00","description":"Ransomware is a type of malicious software that encrypts files, demanding a ransom, often in cryptocurrency, for decryption. Learn about how ransomware attacks work and the measures you can take to protect your data.","breadcrumb":{"@id":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/compscigeeks.com\/blog\/2024\/08\/24\/threat-management-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compscigeeks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Threat Management | Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/compscigeeks.com\/blog\/#website","url":"https:\/\/compscigeeks.com\/blog\/","name":"CompSci Geeks","description":"Expert Computer Science Assistance Anytime, Anywhere!","publisher":{"@id":"https:\/\/compscigeeks.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compscigeeks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/compscigeeks.com\/blog\/#organization","name":"CompSci Geeks","url":"https:\/\/compscigeeks.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/compscigeeks.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/compscigeeks.com\/blog\/wp-content\/uploads\/2024\/07\/logo.png","contentUrl":"https:\/\/compscigeeks.com\/blog\/wp-content\/uploads\/2024\/07\/logo.png","width":152,"height":64,"caption":"CompSci Geeks"},"image":{"@id":"https:\/\/compscigeeks.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/compscigeeks.com\/blog\/#\/schema\/person\/9a0c49ef07b7aebe3139735b320670c3","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09719ff5a504407daa733011a85e9b5033f6143b0f7da656bc694c0357afc281?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09719ff5a504407daa733011a85e9b5033f6143b0f7da656bc694c0357afc281?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09719ff5a504407daa733011a85e9b5033f6143b0f7da656bc694c0357afc281?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/compscigeeks.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/posts\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":1,"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":36,"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/posts\/35\/revisions\/36"}],"wp:attachment":[{"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compscigeeks.com\/blog\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}