Solution

Types of Solutions

Though ransomware is something that should be taken seriously it would not be a problem if you are prepared for it. There are many types of detection methods but we are going to mention some of the most popular ones, file-based and system-based, software and some general tips.

Method base

There are some ways of preventing these types of malwares from happening most of it is mainly prevention. It is harder to get rid of it once it has infliatried your system, that is why one should be prepared for something like this in the future. Many of these prevention methods are detection based techniques for your computer. One example of a detection method would be file-based. This method acts in a way where it detects specific signatures of malicious activities within the operating system. The advantages of using this would be it’s fast detection time when scanning files, this means that if it detects any specific signatures of malicious actions it will warn the user and eliminate the threat, however a disadvantage to this would be the fact that there can be new files developed over time.

Another form of detection method would be system-based. This method in preventing ransomware is used to detect any suspicious behaviors on a computer system. Essentially it evaluates each object’s intended actions on a computer before they execute its behavior. Basically, it checks if certain applications are doing its intended purpose. This type of detection will analyze for any potential behaviors or suspicious activities and if it determines its behavior to be harmful it will cease the application (Lee). This is useful in a way where it keeps everything in check but the downside would be the fact that malware can pretend to be the application and trick the system. Further, through the discussion, the history of ransomware is explained briefly.

Software

Software is highly recommended against crypto viruses. Installing the correct software is just as important since you might install something that has a virus. This software in particular can challenge and prevent many incoming crypto-ransomware. The antivirus software is called Monitoring File System Activity (MFSA), it monitors any malicious activities within your system. This further helps by observing any suspicious activity within the computer data and system. It is highly recommended to have this software installed onto your system.

There is another software which is Pre-Encryption Detection Algorithm (PEDA). PEDA is very strong in terms of checking their attachments and links. The data shows that PEDA identifies about 90% of ransomware from Goodware (Abdullah & Jhanjhi). In other words, when ransomware appears and hides as Goodware, PEDA catches 90% of those ransomwares. In addition to the software, it has three top operations, it verifies and matches the files, API pattern recognition and updates the signature based on file verification. 

General Tips

To add onto the list of solutions, there are some personal things that each individual should take when working for yourself or for someone else. The first solution is to backup all data, information, and resources prior to any attacks happening. The logic behind this is to protect your information and data in case a ransomware attack happens. A harddrive is recommended as a way to back up any important data since it is a physical device that only you have access to. Another way of backing up your data would be a virtual machine which runs a computer on a computer. Any data stored in a virtual machine can then be transferred out. This is a crucial step because if you or the company got attacked by ransomware all your information would be stored in a database for retrieval. Everything would be safe since it is backed up.

Another solution for our problem on ransomware is presetting a Multi Factor Authorization (MFA).  With this security feature implemented it makes it much more difficult for a ransomware attack to occur since the attacker would need access to other resources such as employee emails, cell numbers, or worker credentials to have a fully successful attack.