Category Archives: Network and Information Security

What is a ransomware attack?

Ransom + Software = Ransomware

Ransomware will either:

  • lock the computer to prevent the user from normal usage or
  • encrypt the data that it stored on the victim’s hard disk to prevent access.

Ransomware is a type of malware that forces its victim to pay the ransom through certain online payment methods so as to grand access to their system or to decrypt their data.

Payment is often required in the form of cryptocurrency such as Bitcoin.

In order to minimize the impact of ransomware maintain an offline backup of end-user data.

Example of Ransomware: Locky, CryptoLocker, Cerber, Simplelocker.

www.ece.nu

RSA SecurID

RSA SecurID uses two-factor authentication to determine we are who we say we are. RSA SecurID combines

  • something we know (our PIN) with
  • something we have (our RSA SecurID token that generates the tokencode)

0005 RSA SecurID token

Figure: RSA SecurID token

REFERENCES:

[1] www.emc.com/demo/rsa-securid/index.htm

www.ece.nu

Multifactor authentication

Multifactor authentication means submitting at least two out of three forms of identification.

  • First factor: something you know (e.g. password, PIN)
  • Second factor: something you have (e.g. Credit/Debit card, Mobile phone, Software/Hardware token )
  • Third factor: something you are (e.g. signature, fingerprint)

www.ece.nu