• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Ransomware: What is it and its risks

Kristina Brown - March 2, 2023 Leave a Comment

Ransomware is malware that prevents users from being able to access personal files until a ransom payment is made. Individuals, businesses, and organizations are at risk. The individual carries out the attack by gaining access to a network. From there, they are able to use malware to lock the devices. They often get access through spam, advertising, phishing, and social engineering. Ransomware has become one of the most prominent malware and has impacted millions of people. Hospitals are one of the biggest targets for ransomware attacks. Hospitals and other healthcare facilities are prime targets because they have money and want to quickly pay up to be able to provide their services. These attacks can be detrimental because it exposes personal information and can prevent immediate care to patients which has

led to deaths. As ransomware and other cyberattacks become more prevalent, getting ahead of attacks is key. One way to see if any of your information has been compromised is by testing your password security and checking if any accounts you have had have been breached, like what we did during the cybersecurity portion of the class. Individuals should also implement other factors of security with two-factor authentication and keeping systems up to date. Companies should take extra precautions and train their team on the steps of reporting and handling ransomware situations. They can also implement threat modeling, which is a way of identifying threats within their systems to be able to prevent hacks from breaches. As technology continues to change and expand, the threat of ransomware and cyberattacks, so it is important to take time to be steps ahead of the threat and keep your information backed up.

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University