information security 51

Ransomware and Virus Protection
You work as an information security specialist for a large financial company and your CISO has asked you to investigate the recent ransomware attacks. The CISO wants to ensure that the company is well protected against these types of attacks.

Write a paper in which you answer the following:

Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.
Determine the best practices that should be implemented by the security department to help reduce the risks posed by ransomware.
Propose what users and system administrators should do when a potential infection has been suspected.
Compare and contrast viruses, worms, and Trojans, and indicate which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.
Use the Internet to identify three commercially available antivirus software products for corporate use; compare the features of each and describe which one you would recommend, and why.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:

Analyze system vulnerabilities exploited by hackers.
Design plans that remove Trojans, backdoors, and malware from infected systems.
Use technology and information resources to research issues in cybercrime techniques and response.
Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.

Points: 100

Assignment 3: Ransomware and Virus Protection

Criteria

Unacceptable Below 70% F

Fair 70-79% C

Proficient 80-89% B

Exemplary 90-100% A

Identify the common targets of ransomware. Explain why these targets are so attractive to hackers.

Weight: 22.5%

Did not submit or incompletely identified the common targets of ransomware.

Did not explain why these targets are so attractive to hackers.

Partially identified the common targets of ransomware. Partially explained why these targets are so attractive to hackers.

Satisfactorily identified the common targets of ransomware.

Satisfactorily explained why these targets are so attractive to hackers.

Thoroughly identified the common targets of ransomware.

Thoroughly explained why these targets are so attractive to hackers.

Determine the best practices that shouldbe implemented by the security department to help reduce the risks posed by ransomware. Propose what users and system administrators should do when a potential infection has been suspected.

Weight: 22.5%

Did not submit or incompletely determined the best practices that should be implemented by the security department to help reduce the risks posed by ransomware. Did not submit orfailed to propose what users and system administrators should do when a potential infection has been suspected.

Partially determined the best practices that should be implemented by the security department to help reduce the risks posed by ransomware.

Partially proposed what users and system administratorsshould do when a potential infection has been suspected.

Satisfactorily determined the best practices that should be implemented by the security department to help reduce the risks posed by ransomware.

Satisfactorily proposed whatusers and system administrators should do when a potential infection has beensuspected.

Thoroughly determined the best practices that should be implemented by the security department to help reduce the risks posed by ransomware.

Thoroughly proposed what users and system administrators should do when a potential infection has been suspected.

Compare and contrast viruses, worms, and Trojans, and indicate which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.

Weight: 22.5%

Did not submit or incompletely compared and contrasted viruses, worms, and Trojans, and did not indicate which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.

Partially compared and contrasted viruses, worms, and Trojans; partially indicated which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.

Satisfactorily compared and contrasted viruses, worms, and Trojans; satisfactorily indicated which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel to protect against.

Thoroughly compared and contrasted viruses, worms, and Trojans; thoroughly indicated which of these you consider to be the greatest danger to computer users and / or the greatest challenge for security personnel toprotect against.

Use the Internet to identify three commercially available antivirus software products for corporate use; compare the features of each and describe which one you would recommend, and why.

Weight: 22.5%

Did not submit or incompletely utilized the Internet toidentify three commercially availableantivirus software products for corporate use; did not compare the features of each and did not describe which one you would recommend, and why.

Partially utilized the Internet to identify three commercially available antivirus software products for corporate use; partially compared the features of each and partially described which one you would recommend, andwhy.

Satisfactorily utilized the Internet to identify three commercially available antivirus software products for corporate use; satisfactorily compared the features of each and described which one you would recommend, and why.

Thoroughlyutilized the Internet to identify three commercially available antivirus software products for corporate use; thoroughly compared the features of each and described which one you would recommend, and why.

Provide and utilizeat least three reputable references.

Weight: 5%

No references provided.

Does not meet the required number of references; some or all references are poor quality choices.

Meets number of required references; all references are high quality choices.

Exceeds number of required references; all references are high quality choices.

Clarity, writing mechanics and formatting requirements.

Weight 5%

More than 6 errors present.