Internship

Defend Against Cyber Attacks: Cryptolockers

Description of assignment

Cryptolockers, also known as Cryptoware, fall under the category of ransomware and aim to encrypt computer files. Once these files are encrypted, cybercriminals demand a ransom to restore access to the files.

This internship assignment aims to compare the behavior of Cryptolockers between an unsecured and a secured environment. The security of the environment will be implemented using CyberArk’s Endpoint Security Solution.

Objectives

The following deliverables will be requested:

  1. Successfully executing a cyber attack using a cryptolocker in a test environment.
  2. Securing the test environment using CyberArk’s Endpoint Security Solution.
  3. Demonstrating that the cyber attack with a cryptolocker is no longer possible without daily impact on the users.
Optional extensions

  1. Secure the environment against credential theft and demonstrate that the security works.
  2. Configure JIT (Just-In-Time) elevation of applications for users.
  3. Evaluate how implementing CyberArk’s Endpoint Security Solution affects system performance. Measure and compare the delays and load on the system in both environments.

Project methodology

ActWise uses agile project methodologies for its projects, such as XP and SCRUM. The project described above follows the same approach. These methodologies focus on ensuring the quality of software solutions. This is achieved by breaking the project into shorter iterations and through intensive communication within and outside the project team. The emphasis on intensive communication is an intrinsic feature of agile, resulting in thorough guidance during the internship period.

Ready to apply?

Take the next step in your career journey. Apply now and become part of our team.

School year

2024 - 2025

Contact person

Cindy Van den Hoecke

Internship Supervisor

Jelle Verreth

ActWise is the partner of choice for securing your identities and protecting what matters most within your company.
  • Privileged Management
  • Access Management
  • DevSecOps
  • Identity Security

Download the assignment

Interesting right? Download the assignment and get started on your path to success!

Apply now

Seize this unique opportunity to become part of our innovative team and take the next steps in your career. Fill in your details and discover how you can make a difference!

Workshop meeting