Ransomware In Cybersecurity | What Is Ransomware? | Ransomware Attack | Simplilearn

Sdílet
Vložit
  • čas přidán 26. 07. 2024
  • 🔥Post Graduate Program In Cyber Security: www.simplilearn.com/pgp-cyber...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    🔥Cyber Security Masters Program (Discount Code - YTBE15): l.linklyhq.com/l/1yhwf
    Don't forget to take the quiz at 04:23!
    In today's video, we explain Ransomware in 6 minutes. We answer the questions like what is ransomware and how it works, by covering the ways a ransomware attack can be started with the generic phishing emails, and how hackers demand payment for releasing personal files and information.
    1. Introduction to Ransomware In Cybersecurity 00:00
    2. What is Ransomware In Cybersecurity? 00:42
    3. How does Ransomware spread? 1:44
    4. Types of Ransomware attacks2:30
    5. Ransomware In Cybersecurity - Preventive Measures 3:19
    🔥Enroll for Free Cyber Security Course & Get Your Completion Certificate: www.simplilearn.com/learn-cyb...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    ✅Subscribe to our Channel to learn more about the top Technologies: bit.ly/2VT4WtH
    ⏩ Check out the Cyber Security training videos: bit.ly/3cMmCxj
    #Ransomware #RansomwareExplained #WhatIsRansomware #WhatIsRansomwareAnsHowItWorks #RansomwareExplained #RansomwareExplainedSimply #Simplilearn
    Cybercriminals employ ransomware as a kind of malware (malicious software). When a computer or network is infected with ransomware, the ransomware prevents users from accessing the system and encrypts their data. Cybercriminals hold their victims' data hostage in exchange for ransom money. A vigilant eye and security software are recommended for protection against ransomware infection. Following an infection, victims of malware assaults have three options: they may pay the ransom, attempt to delete the software, or restart the device.
    ➡️ About Post Graduate Program In Cyber Security
    This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing data, including risk analysis, mitigation, and compliance. You will get foundational to advanced skills through industry-leading cyber security certification courses that are part of the program.
    ✅ Key Features
    - Simplilearn Post Graduate Certificate
    - Masterclasses from MIT Faculty
    - Featuring Modules from MIT SCC and EC-Council
    - 8X higher interaction in live online classes conducted by industry experts
    - Simplilearn's JobAssist helps you get noticed by top hiring companies
    - Industry case studies in cyber security
    - Access to CEH Pro Version
    - 25+ hands-on projects
    - Capstone project in 3 domains
    - MIT CSAIL Professional Programs Community
    ✅ Skills Covered
    - Advanced Hacking Concepts
    - Network Packet Analysis
    - Ethical Hacking
    - IDS Firewalls and Honeypots
    - Security and Risk Management
    - Network Security
    - Software Development Security
    - Cryptography OSI and TCPIP Models
    - Identity and Access Management
    - Security Assessment and Testing
    - Trojans Backdoors and Countermeasures
    - Mobile and Web Technologies
    Learn more at: www.simplilearn.com/pgp-cyber...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    For more information about Simplilearn courses, visit:
    - Facebook: / simplilearn
    - LinkedIn: / simplilearn
    - Website: www.simplilearn.com
    - Instagram: / simplilearn_elearning
    - Telegram Mobile: t.me/simplilearnupdates
    - Telegram Desktop: web.telegram.org/#/im?p=@simp...
    Get the Simplilearn app: simpli.app.link/OlbFAhqMqgb
    🔥🔥 Interested in Attending Live Classes? Call Us: IN - 18002127688 / US - +18445327688

Komentáře • 65

  • @SimplilearnOfficial
    @SimplilearnOfficial  Před rokem +1

    🔥Post Graduate Program In Cyber Security: www.simplilearn.com/pgp-cyber-security-certification-training-course?RansomwareScribe&Comments&
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?SCE-IIITBangaloreCS&Comments&
    🔥Cyber Security Masters Program (Discount Code - YTBE15): www.simplilearn.com/cyber-security-expert-master-program-training-course?SCE-MasterCS&Comments&

  • @suvajitdeysarkar7089
    @suvajitdeysarkar7089 Před rokem +11

    The first action should be 4. Isolate the infected device from the parent network and after that 2. Run antivirus scan for the entire system and then 3. Recover from local or cloud backups .
    Am i right ?

  • @SimplilearnOfficial
    @SimplilearnOfficial  Před 2 lety +5

    Don't forget to take the quiz at 04:23!

  • @rengarajank2191
    @rengarajank2191 Před 2 lety +15

    The correct answer is 4.
    The first course of action after a ransomeware attack is to : Isolate device from the parent network.

    • @erics8393
      @erics8393 Před 9 měsíci

      And how can you know if other devices are safe and not effected?

    • @bruhh1138
      @bruhh1138 Před 3 měsíci

      Better be safe than sorry

  • @amirthak4743
    @amirthak4743 Před 2 lety +9

    The answer is 4. Isolate device from parent network

  • @splashdmg5108
    @splashdmg5108 Před 2 lety +1

    4 isolate, thanks and more power!

  • @snehachakraborty691
    @snehachakraborty691 Před 8 dny

    4. isolate the infected device from the parent network

  • @muthuselvan4676
    @muthuselvan4676 Před 2 lety +4

    Option 4 isolate the device from parent network

  • @sprinter5901
    @sprinter5901 Před 2 lety +7

    4. Isolate Device from the parent network. Because it can spread to other devices connected to same network.

  • @Goku23254
    @Goku23254 Před 4 měsíci +3

    I just had a ransomware attack 6 days ago And I was about, to cry But I’m good now I fixed I have all my files back.

    • @dhonims4126
      @dhonims4126 Před 2 měsíci

      How did you get out of that? I'm currently searching solutions

    • @sunrevolver
      @sunrevolver Před 14 dny

      ​@@dhonims4126fresh reinstall and restore from backup

  • @kickmanpanduri
    @kickmanpanduri Před rokem +20

    Please stop the background music it disturbs

  • @Indiantr102
    @Indiantr102 Před rokem

    this is just a simple version of ransomware attack a individual user, the corporate ransomware attack has lot of science of science behind it and very complicated

  • @vigneshm6549
    @vigneshm6549 Před 2 lety +1

    4. Isolate device from the parent network
    Is correct answer

  • @haullwjuw
    @haullwjuw Před 2 lety

    4. Isolate device from parent network

  • @manasprabhu2621
    @manasprabhu2621 Před 2 lety

    2 . Is the correct answer

  • @CelestialJourney20
    @CelestialJourney20 Před 2 lety

    Answer 4
    Isolate device from the parent network

  • @ZorbaPress
    @ZorbaPress Před 2 lety +1

    4 then 3 then 2 then 1.

  • @laithalmushafi4034
    @laithalmushafi4034 Před rokem

    I think is 3 😊

  • @ujwalabenji2096
    @ujwalabenji2096 Před 2 lety

    The correct answer is 4. Isolate the devices from parent network.

  • @bushyasathyasandha3102
    @bushyasathyasandha3102 Před 2 lety +2

    Correct answer is 3.
    The first thing to do is to "Recover from local or cloud backups".

  • @gamef7636
    @gamef7636 Před 11 měsíci +1

    3

  • @SnatrWhamo
    @SnatrWhamo Před 8 měsíci

    I would love to use this video in a course I am putting together ... but our QA needs good closed captions... is there a way we can get the captions included? Thank you for the video!

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 8 měsíci

      We're so glad that you enjoyed your time learning with us! If you're interested in continuing your education and developing new skills, take a look at our course offerings in the description box. We're confident that you'll find something that piques your interest!

  • @vignesh9308
    @vignesh9308 Před 2 lety

    Answer is 4

  • @user-pk5yy9ms1v
    @user-pk5yy9ms1v Před 6 měsíci +1

    Recover from local or cloud backup

  • @shaily903
    @shaily903 Před 6 měsíci +1

    isolate device from network

  • @suwanna315
    @suwanna315 Před rokem

    3,4,2,1

  • @Xperr0w
    @Xperr0w Před 4 měsíci

    how do i recover my files from this virus
    ?

  • @Nimisha777
    @Nimisha777 Před měsícem

    Why captions are vietnamese in your videos, if they would be english, then it will be more helpful.

  • @foodservstaffing6726
    @foodservstaffing6726 Před 6 měsíci

    #4

  • @buoyancydabl
    @buoyancydabl Před 2 měsíci

    Its interesting how in some cases and mine as well in poor countries people just pirate som games and in order to do so you have to disable antivirus and all the tools, since microsoft dont want to have any consequences when victim gets a malware and comply against microsoft. So they just say: "disable it un order to play the games you wont or cant pay for. But you couldnt sue us. Also, disabling it is interfiering in system work, so we wont let you to do so, but we understand its impossible to restrict people from doing it and itll be always possibilities to do so no matter what we do. Enjoy ;)". Literally I spend some good amount of time permanently destroying the antivirus since there is an option to disable it but in my case its automatically on after literally 5 seconds. Another reason why I did it is its updates, that just throwing my old pc into junkyard. I cant play because every 30 minutes+-some random amount of seconds they update it and when they do my 13 y.o. pc just being ddosed.

  • @dhstudios1269
    @dhstudios1269 Před 5 měsíci

    Reinstall windows too

  • @manish427
    @manish427 Před 2 měsíci +1

    Isolated the system first..

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 2 měsíci

      Hi, you got the correct answer. The answer is 4. Isolate device from the parent network.

  • @arlight2412
    @arlight2412 Před 2 měsíci

    2

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 2 měsíci

      Hello! You got it right. The correct answer is Option B) Digital Ledger
      Blockchain is the whole chain of Blocks where transactions are stored but these transactions are stored in the form of digital ledger in each of these blocks. In shorts, Blockchain is a collection of these transaction but they are stored in these blocks of Blockchain in the form of digital ledger.

  • @01714329421
    @01714329421 Před 10 měsíci

    Option 4

  • @user-lr9fy2ho5c
    @user-lr9fy2ho5c Před rokem

    4

  • @emotionallife2035
    @emotionallife2035 Před rokem

    4

  • @vamshi1199
    @vamshi1199 Před měsícem

    3

  • @surendragamezone5329
    @surendragamezone5329 Před 2 měsíci

    4

  • @adityapadhi1909
    @adityapadhi1909 Před 3 měsíci

    4

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 2 měsíci

      Hi, you got the correct answer. The answer is 4. Isolate device from the parent network.

  • @audriebouwmeester7002
    @audriebouwmeester7002 Před 4 měsíci

    4

    • @SimplilearnOfficial
      @SimplilearnOfficial  Před 2 měsíci

      Hi, you got the correct answer. The answer is 4. Isolate device from the parent network.