System Malware Threats

Malware, also known as malicious software, can be classified several ways to distinguish the unique types of malware from each other. Distinguishing and classifying different types of malware from each other is important to better understanding how they can infect computers and devices, the threat level they pose and how to protect against them.
Malware types with multiple functions
Individual malware programs often include several malicious functions and propagation routines—and, without some additional classification rules. this could lead to confusion.
For example, a specific malicious program may be capable of being spread via an email attachment and as files via P2P networks. The program may also can harvest email addresses from an infected computer, without the consent of the user. With this range of functions. the program could be correctly classified as an Email-Worm, a P2P-Worm or a Trojan-Mailfinder. According to Massachusetts Inventor (2012), there are sets of rules that can automatically categorize a malicious program as having a particular behavior, regardless of the program functions. This classification can be based on behavior which has its own threat level. Additionally, the behavior can be categorized by which may pose a higher risk than the other.
So, in our example, the Email-Worm behavior represents a higher level of threat than either the P2P-Worm or Trojan-Mailfinder behavior—and thus, our example malicious program would be classified as an Email-Worm.

If a malicious program has two or more functions that all have equal threat levels—such as Trojan-Ransom, Trojan-ArcBomb, Trojan-Clicker, Trojan-DDoS, Trojan-Downloader, Trojan-Dropper, Trojan-IM, Trojan-Notifier, Trojan-Proxy, Trojan-SMS, Trojan-Spy, Trojan-Mailfinder, Trojan-GameThief, Trojan-PSW, or Trojan-Banker—the program is classified as a Trojan.
If a malicious program has two or more functions with equal threat levels—such as IM-Worm, P2P-Worm, or IRC-Worm—the program is classified as a Worm.
Read the following in preparation for the discussion:
Gallagher, S. (2016). New ransomware installs in boot record, encrypts hard disk [Updated]. Retrieved from https://arstechnica.comfsecurity/2016/03/new-ransomware-installs-in-boot-record-encrypts-hard-disk/
Goodin, D. (2017). Tuesday’s massive ransomware outbreak was, in fact, something much worse. Retrieved from https://arstechnica.com/security/2017/06/petya-outbreak-was-a-chaos-sowing-wiper-not-profit-seeking-ransomwarel
Given the current state of malware, discuss how Ransomware is rising to the top of the malware chain. Research the recent outbreaks of ransomware and discuss how this could threaten Saudi companies, personal systems, etc. and disclose methods of ingress into systems as well as methods of countering the threat.