针对勒索攻击的企业信息安全政策

Syed Naeem Ahmed, Raazi M. K. Syed, Rashid Kamal, Mubashir Khan
{"title":"针对勒索攻击的企业信息安全政策","authors":"Syed Naeem Ahmed, Raazi M. K. Syed, Rashid Kamal, Mubashir Khan","doi":"10.1109/MAJICC56935.2022.9994155","DOIUrl":null,"url":null,"abstract":"The ransomware attacks have created challenges for the entire world today and industries are getting affected from such sophisticated attacks, whether they are healthcare, educational, financials or any other service sectors, they are not safe from these malware attack. In these types of attacks, user data is encrypted or inaccessible to the victim, the hacker then demands money from the victim to give them access to their data after payment is done. This study guides how to mitigate ransomware attacks by adopting corporate information security policies in the organization with timely complete compliance. Ransomware is often designed to spread across networks and target information asset of organization, in healthcare Electronic Medical Record, HIMS, Database Server, File Servers, Application Server, Web Server, Domain Controllers and all associated & connected devices including IOT device, SCADA (Supervisory Control and Data Acquisition), once they are targeted the entire organization operations can be halted and paralyzed. Ransomware frequently changes its techniques to exploit the vulnerability, this research is based on technical & administrative controls, security standards, procedures, guidelines, best practices by following security frameworks i.e. (ISO 27001, HIPPA, and NIST) and the objective is to mitigate the attacks.","PeriodicalId":205027,"journal":{"name":"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Corporate Information Security Policies Targeting Ransomw are Attack\",\"authors\":\"Syed Naeem Ahmed, Raazi M. K. Syed, Rashid Kamal, Mubashir Khan\",\"doi\":\"10.1109/MAJICC56935.2022.9994155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ransomware attacks have created challenges for the entire world today and industries are getting affected from such sophisticated attacks, whether they are healthcare, educational, financials or any other service sectors, they are not safe from these malware attack. In these types of attacks, user data is encrypted or inaccessible to the victim, the hacker then demands money from the victim to give them access to their data after payment is done. This study guides how to mitigate ransomware attacks by adopting corporate information security policies in the organization with timely complete compliance. Ransomware is often designed to spread across networks and target information asset of organization, in healthcare Electronic Medical Record, HIMS, Database Server, File Servers, Application Server, Web Server, Domain Controllers and all associated & connected devices including IOT device, SCADA (Supervisory Control and Data Acquisition), once they are targeted the entire organization operations can be halted and paralyzed. Ransomware frequently changes its techniques to exploit the vulnerability, this research is based on technical & administrative controls, security standards, procedures, guidelines, best practices by following security frameworks i.e. (ISO 27001, HIPPA, and NIST) and the objective is to mitigate the attacks.\",\"PeriodicalId\":205027,\"journal\":{\"name\":\"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MAJICC56935.2022.9994155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MAJICC56935.2022.9994155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

勒索软件攻击给当今世界带来了挑战,各行各业都受到这种复杂攻击的影响,无论是医疗保健、教育、金融还是任何其他服务部门,都无法免受这些恶意软件攻击的影响。在这些类型的攻击中,用户数据被加密或受害者无法访问,然后黑客向受害者索要金钱,以便在付款后允许他们访问他们的数据。本研究指导如何通过在组织中采用及时完全合规的企业信息安全策略来减轻勒索软件攻击。勒索软件通常被设计成跨网络传播和目标组织的信息资产,在医疗保健电子病历,HIMS,数据库服务器,文件服务器,应用服务器,Web服务器,域控制器和所有相关和连接的设备,包括物联网设备,SCADA(监督控制和数据采集),一旦它们成为目标,整个组织的运营可能会停止和瘫痪。勒索软件经常改变其技术来利用漏洞,本研究基于技术和管理控制,安全标准,程序,指导方针,遵循安全框架的最佳实践,即(ISO 27001, HIPPA和NIST),目标是减轻攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Corporate Information Security Policies Targeting Ransomw are Attack
The ransomware attacks have created challenges for the entire world today and industries are getting affected from such sophisticated attacks, whether they are healthcare, educational, financials or any other service sectors, they are not safe from these malware attack. In these types of attacks, user data is encrypted or inaccessible to the victim, the hacker then demands money from the victim to give them access to their data after payment is done. This study guides how to mitigate ransomware attacks by adopting corporate information security policies in the organization with timely complete compliance. Ransomware is often designed to spread across networks and target information asset of organization, in healthcare Electronic Medical Record, HIMS, Database Server, File Servers, Application Server, Web Server, Domain Controllers and all associated & connected devices including IOT device, SCADA (Supervisory Control and Data Acquisition), once they are targeted the entire organization operations can be halted and paralyzed. Ransomware frequently changes its techniques to exploit the vulnerability, this research is based on technical & administrative controls, security standards, procedures, guidelines, best practices by following security frameworks i.e. (ISO 27001, HIPPA, and NIST) and the objective is to mitigate the attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信