CIS 552 Week 7 Discussion Ransomware
This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk.
- Use the Internet or the Strayer Library to research recent ransomware attacks. Summarize an attack and describe how the attack was resolved. Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks. Share a website or resource that shows how to mitigate ransomware attacks. Share with your classmates, and include links to any useful resource you find.
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.
CIS 552 Week 7 Discussion Ransomware
This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk.
- Use the Internet or the Strayer Library to research recent ransomware attacks. Summarize an attack and describe how the attack was resolved. Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks. Share a website or resource that shows how to mitigate ransomware attacks. Share with your classmates, and include links to any useful resource you find.
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.
CIS 552 Week 7 Discussion Ransomware
This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk.
- Use the Internet or the Strayer Library to research recent ransomware attacks. Summarize an attack and describe how the attack was resolved. Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks. Share a website or resource that shows how to mitigate ransomware attacks. Share with your classmates, and include links to any useful resource you find.
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.