Using this resource
Glassberg, J. (2015). The ransomware threat. Law Enforcement Technology, 42(9), 33-35
Then, write a case study that answers the following questions:
â—¾What was the problem? What were the effects of the problem?
â—¾What is the profile of the hacker?
â—¾What can be done to protect against the threat?
â—¾What should be done if a computer is infected with ransomware?
â—¾What type(s) of cybercrime was/were involved in this article? Does the identified offender fit the characteristics for this type of cybercrime?
Your assignment should be a minimum of two pages in length, not counting the title and reference pages, and you should use APA formatting. In addition, any references used should be properly cited.
ASSIGNMENT COMPLETED AT https://capitalessaywriting.com
MAKE YOUR ORDER AND GET THE COMPLETED ORDER and get Ransomware threat/Law enforcement technology information
Based on the article, the problem that was encountered was inability of the detectives to access important files in the police department. The ransomware that had been infected in the computers prevented the detectives from accessing the crucial files. The hackers use the ransomware to block access to the files stored in the computer hard drive or the computer itself(Glassberg, 2015). For example, Crypto-ransomware functions by encrypting all the files stored in computer hard drive. While winlocker prevent access to computer by either creating a pop-up window on the screen or by disabling the bootup function. The consequence of this is that the files can be lost permanently if the computers are not cleaned on time. The department may be forced to pay the ransom if there was no back up for the files.
Looking at the profile of the hacker, it was evident that he/she is very sophisticated and organized. There is no doubt that the hacker developed and customized the ransomware which requires a lot of skills and resources. Therefore, it can be said that he/she is a season hacker and likely part of the coordinated cybercrime group. To prevent against ransomware, the computer should run on up-to-date operating systems which have anti-ransomware capabilities. The IT department should also ensure that the network connecting the computer is protected using multilayer defense approach with alert mechanism that warns when one layer is compromised, thus allowing the IT personnel to disconnect the affected computers from unaffected computers(Glassberg, 2015). Also, regular security checks should be conducted to detect the………………………………………………………………………………………………
ASSIGNMENT COMPLETED AT https://capitalessaywriting.com
MAKE YOUR ORDER AND GET THE COMPLETED ASSIGNMENT
Read on Ransomware threat/Law enforcement technology