Ransomware In 6 Minutes | What Is Ransomware And How It Works? | Ransomware Explained | Simplilearn

Поділитися
Вставка
  • Опубліковано 2 чер 2024
  • 🔥Post Graduate Program In Cyber Security: www.simplilearn.com/pgp-cyber...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    🔥Cyber Security Masters Program (Discount Code - YTBE15): www.simplilearn.com/cyber-sec...
    Don't forget to take the quiz at 04:23!
    In today's video, we explain Ransomware in 6 minutes. We answer the questions like what is ransomware and how it works, by covering the ways a ransomware attack can be started with the generic phishing emails, and how hackers demand payment for releasing personal files and information.
    1. Introduction 00:00
    2. What is Ransomware? 00:42
    3. How does Ransomware spread? 1:44
    4. Types of Ransomware attacks 2:30
    5. Preventive Measures 3:19
    🔥Enroll for Free Cyber Security Course & Get Your Completion Certificate: www.simplilearn.com/learn-cyb...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    ✅Subscribe to our Channel to learn more about the top Technologies: bit.ly/2VT4WtH
    ⏩ Check out the Cyber Security training videos: bit.ly/3cMmCxj
    #Ransomware #RansomwareExplained #WhatIsRansomware #WhatIsRansomwareAnsHowItWorks #RansomwareExplained #RansomwareExplainedSimply #Simplilearn
    Cybercriminals employ ransomware as a kind of malware (malicious software). When a computer or network is infected with ransomware, the ransomware prevents users from accessing the system and encrypts their data. Cybercriminals hold their victims' data hostage in exchange for ransom money. A vigilant eye and security software are recommended for protection against ransomware infection. Following an infection, victims of malware assaults have three options: they may pay the ransom, attempt to delete the software, or restart the device.
    ➡️ About Post Graduate Program In Cyber Security
    This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing data, including risk analysis, mitigation, and compliance. You will get foundational to advanced skills through industry-leading cyber security certification courses that are part of the program.
    ✅ Key Features
    - Simplilearn Post Graduate Certificate
    - Masterclasses from MIT Faculty
    - Featuring Modules from MIT SCC and EC-Council
    - 8X higher interaction in live online classes conducted by industry experts
    - Simplilearn's JobAssist helps you get noticed by top hiring companies
    - Industry case studies in cyber security
    - Access to CEH Pro Version
    - 25+ hands-on projects
    - Capstone project in 3 domains
    - MIT CSAIL Professional Programs Community
    ✅ Skills Covered
    - Advanced Hacking Concepts
    - Network Packet Analysis
    - Ethical Hacking
    - IDS Firewalls and Honeypots
    - Security and Risk Management
    - Network Security
    - Software Development Security
    - Cryptography OSI and TCPIP Models
    - Identity and Access Management
    - Security Assessment and Testing
    - Trojans Backdoors and Countermeasures
    - Mobile and Web Technologies
    Learn more at: www.simplilearn.com/pgp-cyber...
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advan...
    For more information about Simplilearn courses, visit:
    - Facebook: / simplilearn
    - LinkedIn: / simplilearn
    - Website: www.simplilearn.com
    - Instagram: / simplilearn_elearning
    - Telegram Mobile: t.me/simplilearnupdates
    - Telegram Desktop: web.telegram.org/#/im?p=@simp...
    Get the Simplilearn app: simpli.app.link/OlbFAhqMqgb
    🔥🔥 Interested in Attending Live Classes? Call Us: IN - 18002127688 / US - +18445327688

КОМЕНТАРІ • 61

  • @SimplilearnOfficial
    @SimplilearnOfficial  11 місяців тому +1

    🔥Post Graduate Program In Cyber Security: www.simplilearn.com/pgp-cyber-security-certification-training-course?RansomwareScribe&Comments&
    🔥IIIT Bangalore Advanced Executive Program In Cybersecurity (India Only): www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?SCE-IIITBangaloreCS&Comments&
    🔥Cyber Security Masters Program (Discount Code - YTBE15): www.simplilearn.com/cyber-security-expert-master-program-training-course?SCE-MasterCS&Comments&

  • @suvajitdeysarkar7089
    @suvajitdeysarkar7089 Рік тому +8

    The first action should be 4. Isolate the infected device from the parent network and after that 2. Run antivirus scan for the entire system and then 3. Recover from local or cloud backups .
    Am i right ?

  • @Goku23254
    @Goku23254 2 місяці тому +3

    I just had a ransomware attack 6 days ago And I was about, to cry But I’m good now I fixed I have all my files back.

    • @dhonims4126
      @dhonims4126 13 днів тому

      How did you get out of that? I'm currently searching solutions

  • @splashdmg5108
    @splashdmg5108 2 роки тому +1

    4 isolate, thanks and more power!

  • @rengarajank2191
    @rengarajank2191 2 роки тому +13

    The correct answer is 4.
    The first course of action after a ransomeware attack is to : Isolate device from the parent network.

    • @erics8393
      @erics8393 7 місяців тому

      And how can you know if other devices are safe and not effected?

    • @bruhh1138
      @bruhh1138 Місяць тому

      Better be safe than sorry

  • @muthuselvan4676
    @muthuselvan4676 2 роки тому +4

    Option 4 isolate the device from parent network

  • @amirthak4743
    @amirthak4743 2 роки тому +7

    The answer is 4. Isolate device from parent network

  • @sprinter5901
    @sprinter5901 2 роки тому +6

    4. Isolate Device from the parent network. Because it can spread to other devices connected to same network.

    • @kanwalfareed748
      @kanwalfareed748 Рік тому

      but why we isolate a device

    • @Mautrail3
      @Mautrail3 Рік тому +2

      @@kanwalfareed748 so it doesn’t spread

  • @Indiantr102
    @Indiantr102 Рік тому

    this is just a simple version of ransomware attack a individual user, the corporate ransomware attack has lot of science of science behind it and very complicated

  • @vigneshm6549
    @vigneshm6549 2 роки тому

    4. Isolate device from the parent network
    Is correct answer

  • @manasprabhu2621
    @manasprabhu2621 2 роки тому

    2 . Is the correct answer

  • @haullwjuw
    @haullwjuw 2 роки тому

    4. Isolate device from parent network

  • @CelestialJourney20
    @CelestialJourney20 2 роки тому

    Answer 4
    Isolate device from the parent network

  • @user-pk5yy9ms1v
    @user-pk5yy9ms1v 4 місяці тому +1

    Recover from local or cloud backup

  • @ujwalabenji2096
    @ujwalabenji2096 2 роки тому

    The correct answer is 4. Isolate the devices from parent network.

  • @SnatrWhamo
    @SnatrWhamo 6 місяців тому

    I would love to use this video in a course I am putting together ... but our QA needs good closed captions... is there a way we can get the captions included? Thank you for the video!

    • @SimplilearnOfficial
      @SimplilearnOfficial  6 місяців тому

      We're so glad that you enjoyed your time learning with us! If you're interested in continuing your education and developing new skills, take a look at our course offerings in the description box. We're confident that you'll find something that piques your interest!

  • @ZorbaPress
    @ZorbaPress 2 роки тому +1

    4 then 3 then 2 then 1.

  • @laithalmushafi4034
    @laithalmushafi4034 Рік тому

    I think is 3 😊

  • @vignesh9308
    @vignesh9308 2 роки тому

    Answer is 4

  • @shaily903
    @shaily903 4 місяці тому +1

    isolate device from network

  • @kickmanpanduri
    @kickmanpanduri Рік тому +16

    Please stop the background music it disturbs

    • @Pax622
      @Pax622 Рік тому

      I can't hear it

    • @Giggles_iJest
      @Giggles_iJest 6 місяців тому +1

      Skill issue

    • @Stovetopcookie
      @Stovetopcookie 5 місяців тому +3

      I know. Too much talking. I can’t enjoy the tune.

    • @preethammm4660
      @preethammm4660 2 місяці тому

      Yes please stop the background music and speak clearly

    • @animemuse8613
      @animemuse8613 Місяць тому

      It helps for me

  • @SimplilearnOfficial
    @SimplilearnOfficial  2 роки тому +5

    Don't forget to take the quiz at 04:23!

  • @Xperr0w
    @Xperr0w 2 місяці тому

    how do i recover my files from this virus
    ?

  • @bushyasathyasandha3102
    @bushyasathyasandha3102 2 роки тому +2

    Correct answer is 3.
    The first thing to do is to "Recover from local or cloud backups".

  • @suwanna315
    @suwanna315 Рік тому

    3,4,2,1

  • @gamef7636
    @gamef7636 9 місяців тому +1

    3

  • @dhstudios1269
    @dhstudios1269 3 місяці тому

    Reinstall windows too

  • @buoyancydabl
    @buoyancydabl 18 днів тому

    Its interesting how in some cases and mine as well in poor countries people just pirate som games and in order to do so you have to disable antivirus and all the tools, since microsoft dont want to have any consequences when victim gets a malware and comply against microsoft. So they just say: "disable it un order to play the games you wont or cant pay for. But you couldnt sue us. Also, disabling it is interfiering in system work, so we wont let you to do so, but we understand its impossible to restrict people from doing it and itll be always possibilities to do so no matter what we do. Enjoy ;)". Literally I spend some good amount of time permanently destroying the antivirus since there is an option to disable it but in my case its automatically on after literally 5 seconds. Another reason why I did it is its updates, that just throwing my old pc into junkyard. I cant play because every 30 minutes+-some random amount of seconds they update it and when they do my 13 y.o. pc just being ddosed.

  • @foodservstaffing6726
    @foodservstaffing6726 4 місяці тому

    #4

  • @manish427
    @manish427 25 днів тому +1

    Isolated the system first..

    • @SimplilearnOfficial
      @SimplilearnOfficial  23 дні тому

      Hi, you got the correct answer. The answer is 4. Isolate device from the parent network.

  • @arlight2412
    @arlight2412 Місяць тому

    2

    • @SimplilearnOfficial
      @SimplilearnOfficial  28 днів тому

      Hello! You got it right. The correct answer is Option B) Digital Ledger
      Blockchain is the whole chain of Blocks where transactions are stored but these transactions are stored in the form of digital ledger in each of these blocks. In shorts, Blockchain is a collection of these transaction but they are stored in these blocks of Blockchain in the form of digital ledger.

  • @01714329421
    @01714329421 8 місяців тому

    Option 4

  • @user-lr9fy2ho5c
    @user-lr9fy2ho5c 10 місяців тому

    4

  • @emotionallife2035
    @emotionallife2035 Рік тому

    4

  • @surendragamezone5329
    @surendragamezone5329 13 днів тому

    4

  • @adityapadhi1909
    @adityapadhi1909 Місяць тому

    4

    • @SimplilearnOfficial
      @SimplilearnOfficial  23 дні тому

      Hi, you got the correct answer. The answer is 4. Isolate device from the parent network.

  • @audriebouwmeester7002
    @audriebouwmeester7002 3 місяці тому

    4

    • @SimplilearnOfficial
      @SimplilearnOfficial  23 дні тому

      Hi, you got the correct answer. The answer is 4. Isolate device from the parent network.