Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

4.1 What are your choices if you are hit by ransomware? Which would you recommen

ID: 3754967 • Letter: 4

Question

4.1 What are your choices if you are hit by ransomware? Which would you recommend?

4-2. a) What form of authentication would you recommend for relatively unimportant resources? Justify your answer.

b) What form of authentication would you recommend for your most sensitive resources?

4-3. What is the promise of newer authentication systems?

4-4. Is the supplicant the true party or an impostor?

4-5. In digital certificate authentication, the supplicant could impersonate the true party by doing the calculation with the true party’s private key. What prevents impostors from doing this?

4-6. What are the implications for digital certificate authentication if the true party’s private key is stolen?

4-7. a) If someone in your firm gives you his or her password and you log into that person’s account, is this hacking? Justify your answer in terms of the definition of hacking.

b) If you think someone in your office is sending slanderous e-mail about you, is it hacking if you break into that person’s e-mail account to see if this is true? Justify using the definition.

c) If you log into a server at your bank to test their security, is this hacking? Justify using the definition.

Explanation / Answer

4.1.)

1. Disconnect your machine from any others, and from any external drives. If you're on a network, go offline. You don't want the ransomware to spread to other devices on your local network or to file-syncing services such as Dropbox.

2. Use a smartphone or a camera to take a photograph of the ransom note presented on your screen. If you can take a screenshot, do so as well. You'll want to file a police report later, after you go through all these steps.

3. Use antivirus or anti-malware software to clean the ransomware from the machine,but only do so if you are determined not to pay the ransom. (Otherwise, wait until you've recovered your files.) You may have to reboot into Safe Mode by pressing the power button and the S key on the keyboard at the same time.

Removing the ransomware will not decrypt your files, and it may kill your chances of getting the files back by paying the ransom. But it will let you carry out all of the following steps without the risk that the ransomware will encrypt new files or try to thwart the recovery process.

4. See if you can recover deleted files. Many forms of encrypting ransomware copy your files, encrypt the copies and then delete the originals. Fortunately, you can often recover deleted files easily with tools such as the free ShadowExplorer or the paid Data Recovery Download.

5. Figure out exactly which strain of encrypting ransomware you're dealing with. If the ransomware doesn't announce its own name, then try the Crypto Sheriff online tool or the ID Ransomware online tool. Both let you upload encrypted files and then tell you whether the encryption can be reversed. (In many instances, it can't be.)

6. See if there are decryption tools available. If you already know the name of the ransomware strain, cruise over to the list of decryption tools at the No More Ransom website and see if there's a matching decryptor. (The top two entries on the list, Rakhni and Rannoh, can decrypt multiple strains.) The list is not alphabetical, and new decryptors are added to the bottom of the list.

4.2)

a). The form of authentication I would recommend for relatively unimportant resources is reusable passwords. Because it is inexpensive and convenient; you only need to type the same password each time you need access to the resource.

b). The form of authentication I would recommend for your most sensitive resources is the electronic signature. Because just as people use signatures to authenticate individual written letters. Electronic signature provides a sender’s identity. An electronic signature allows the receiver to detect a message added to the dialogue by an impostor.

4.3) The promise of newer authentication systems is that they are crucial to controlling access to resources so that adversaries can be prevented from reaching them.

4.4) The supplicant is an imposter.

NOTE: As per Chegg policy, I am allowed to answer only 4 questions on a single post. Kindly post the remaining questions separately and I will try to answer them. Sorry for the inconvenience caused.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote