Ans. NR583NP Week 7 Discussion: Cybersecurity

Follow these guidelines when completing each component of the discussion. Contact your course faculty if you have questions.

General Instructions

Use the table below to identify the cybersecurity breach assigned based on the first letter of your first name. For example, if your first name is Gilda then your assigned app is malware. Create a fictional scenario involving the assigned breach.

First initial of your first name Cybersecurity breach
A-E Phishing
F-J Malware
K-O Ransomware
P-S Insider Threat
T-Z Spoofing

Include the following sections:

  1. Application of Course Knowledge: Answer all questions/criteria with explanations and detail.
    • Identify and define your assigned breach.
    • Describe the type of organization in which the breach occurred.
    • Identify who was involved.
    • Describe how the breach occurred.
    • Examine how the threat could impact the organization. Discuss what consequences the breach may cause.

Answer

Identify and define your assigned breach. 

Ransomware is a type of malicious software designed to block access to a computer system or data until a sum of money, or ransom, is paid ((OCR), 2021). It typically encrypts files on the victim’s device, rendering them inaccessible, and then demands payment in exchange for the decryption key ((OCR), 2021)………….. Kindly click the purchase icon to access the full solution for $6 or WHATSAPP +254712575747