Another University, which used a similar approach with dedicated sensors to monitor their campus, is suddenly attacked by a Ransomware Worm, which encrypts all the data on the sensors and ask for the University to pay a ransom in Bitcoin, threatening to “brick” the sensors.
The University is worried something similar might happen to the network of sensors described in the previous Case Studies.
Describe a method to analyse the risk of a ransomware attack.
Design and justify a security analysis method in a report (400 words max per report). This report must be written as if you were asked by a client or stakeholder of a specific system to explain which security analysis method you would use for that specific system. Case studies might use systems and concepts not covered in the lecture material, thus mimicking the fact that no security analysist is aware of all systems existing in the wild. It is your responsibility to find information relevant to these systems. In some cases, you might have to make some assumptions on how these systems are organised or used. In this case, it is expected you will justify your assumptions based on your understanding of the context.
Sample Solution