Texas Ransomware Attacks

Texas Ransomware Attacks

Find an article on the Internet outline a security breach or cyber attack

Find an article on the Internet outline a security breach or cyber attack. Provide a link to the article, what type of attack was used, why the attack was successful, and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy (2-page minimum). A minimum of 4 sources is required.

APA must be observed when citing the source both in-text and in the reference section.

Please follow the attahced assignment rubric to complete this task.

Answer preview

Ransomware is a type of malware that precludes the owner’s access to data or threatens to destroy it unless the user of that information pays a ransom. Regardless of the strategy used, the core element of ransomware is that a user cannot access the data in question unless he or she pays a predetermined sum of money to the hacker (Richardson & North, 2017). Several bodies having affiliations to government and public agencies…

(1100 wods)

Scroll to Top