Professional Documents
Culture Documents
Research Aguti
Research Aguti
Computer science Field , Cyber Security Problem , Ransomware, solutions and steps taken
to solve the problem in Kampala
What is Ransomware and what are the ways and steps of mitigating it?
My research project talks about a field of computer science, cyber security. Cyber security is the
practice of defending computers, servers, mobile devices, electronic systems, networks, and data
from malicious attacks. It's also known as information technology security or electronic
information security. This field faces a serious issue known as Ransomware. I have exposed the
understanding of this issue, how it affects, its solutions and the steps taken to mitigate the issue.
Ransomware is the biggest concern now in the digital world. In the year 2021, there were an
unprecedented number of ransomware attacks, and this trend continued to happen in Kampala
throughout this year. Ransomware is a malicious attack that leaves your data locked or encrypted
by anonymous cybercriminals. The attackers provide instructions on how to decrypt the files,
and the victims can eventually have their files back after paying a hefty “ransom” upfront.
As the word ransom suggests, it’s hacking into the user’s sensitive information and denying them
access to it until a ransom amount is paid to the hackers. Now, businesses such as those doing
ecommerce that need access to their data to run their daily operations suffer a lot from this
breach, highlighting a serious emphasis that needs to be given by them on their data security
strategies. Besides this, more and more attacks were reported after the pandemic since every
information circulated was using the means of digitalization.
Prevention is the best form of defense when it comes to ransomware. If you or your company
does not have robust preventative security measures in place, you can often find yourself in the
midst of a ransomware attack.
A ransomware attack can be utterly devastating. But if you act promptly immediately after a
ransomware attack, you can mitigate some of the damage using the following ways.
1
NKINZI JOSELINE 20/U/ITD/12687/GV
These are some of the steps that can be followed to mitigate the issue of ransomware
Stay Calm and Collected ,It's difficult to stay calm and composed when you cannot
access important files on your computer. But the first step to take after getting hit by
ransomware is to not panic and stay level-headed. Staying calm and taking a step back
can sometimes open doors for negotiations with the attacker.
Take a Photo of the Ransomware Note ,The second step is to immediately take a
picture of the ransomware note on your screen through your smartphone or a camera.
This will help you in filing a police report and will expedite the process of recovery.
Quarantine Affected Systems ,It's important to isolate the affected systems as soon as
possible. Ransomware typically scans the target network and propagates laterally to other
systems.
Look for Decryption Tools, If you already know the name of your ransomware strain,
then you can simply plug it into the website and search for the matching decryption. The
list is not alphabetical, and the site adds new decryption tools to the bottom of the list.
Disconnect Backups ,It is imperative for you or your organization to secure your
backups by severing them from the rest of the network. You should also lock down
access to backup systems until after the infection gets removed
2
NKINZI JOSELINE 20/U/ITD/12687/GV
To determine the ransomware strain, you can use free services such as Emsisoft’s online
ransomware identification tool or ID Ransomware.
These services allow users to upload a sample of the encrypted file, any ransom note left
behind, and the attacker's contact information, if available. The analysis of this
information can identify the type of ransomware strain that has impacted the user's files.
Reset Passwords ,Change all online and account passwords once you have disconnected
the affected systems from the network.
Report the Ransomware, The moment you notice a ransomware attack, be sure to
contact law enforcement.
.Decide Whether to Pay or Not, Only pay for ransomware if you have exhausted all
other options and the loss of data is more damaging to you or your company than paying
the ransom.
In conclusion, If you are a victim of a ransomware attack, keep in mind that you can reduce its
impact if you take prompt and immediate action following the attack, ransomware is relentless
and damaging. But with due diligence and by following good security hygiene, you can stop
these malicious attacks before they can cause significant damage.
References
1.https://www.simplilearn.com/introduction-to-cyber-security-article
2.https://www.makeuseof.com/ransomware-attack-steps-to-take/
3.https://www.thesagenext.com/blog/emerging-cybersecurity-challenges/