17 Aug Please indicate how your answers to the foregoing questions correspond to symmetric/asymmetric ciphers, cryptographic data, mutual trust, or network security
Topics covered in class
Cryptography Overview
Kill Chain
Ransomware and Bitcoin
Caesar Cipher
PKI Encryption
Backdoors
VPN’s
Hashing, Keys and Digital Signatures
5G and IoT
TLS etc.
Please see the attached document and answer questions below
There are 5 questions.
1. What is a ransomware attack, and how did REvil perpetrate such attacks? Please explain.
2. How did Cybercom stymie the operations of REvil? Please explain by situating your analysis within the framework of the kill chain and by referring to specific cybersecurity and cryptographic technologies and techniques.
3. Regarding question # 2, do you see any irony in how Cybercom stymied REvil’s operations? Please explain.
4. is the strategy that Cybercom deployed to stymie REvil replicable for use in stymying REvil’s successor and other perpetrators of ransomware attacks? Please explain.
5. Please indicate how your answers to the foregoing questions correspond to symmetric/asymmetric ciphers, cryptographic data, mutual trust, or network security
