Page 38 - Cyber Warnings
P. 38







Also, we would deal with some web resources indicating that there are some tools being
available online that could secure you from the ransomware attacks. In total, this would sound
quite promising and we believe that the entire society would find a way to deal with this
challenge.

It’s especially beneficial that the majority of the Law Enforcement agencies would get more and
more capable to handle this sort of crime, so we can expect in the future that those services
would be able to resolve the majority of our concerns.

The role of good incident response

In case of ransomware threat – it’s good to know that even if you are a victim of the cybercrime
campaign – there are still the ways to respond to such a situation. For example, many experts
would suggest that the best way to assure your IT infrastructure is to create its backup. You can
do that using some physical devices or – as it’s quite popular nowadays – using some of the
cloud-based systems.

In this case – we would talk about the crypto ransomware attacks that would make your files
and date getting locked. If you got the backup of your office – you would easily delete all the
files being encrypted and recover your data applying the backup option. It’s quite obvious that
the backuping is one of the main best practice procedures that should get followed in any case.

The conclusions

The role of this effort is to provide a quite comprehensive insight into a cybersecurity challenge
as ransomware is. We are aware of that this topic would get emerging nowadays, so please
consider our article as something dealing with the new tendencies in the area of cyber defense.

Finally, the point would be that some future solutions would offer us the better opportunities in
coping with the similar types of threats.

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.

She writes for American and Asia-Pacific security magazines. She is a volunteer with the
American corner of Subotica as well as a lecturer with the local engineering society.





38 Cyber Warnings E-Magazine – April 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   33   34   35   36   37   38   39   40   41   42   43