From 954cc469cf7cab9c50c18b312fa9741895abd235 Mon Sep 17 00:00:00 2001 From: Shreya Date: Fri, 25 Jun 2021 19:07:32 +0530 Subject: [PATCH] docs: Reword paragaraph about why ransomware simulation is sufficient --- docs/content/reference/ransomware.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/content/reference/ransomware.md b/docs/content/reference/ransomware.md index a8d9b265e..a8f7273ea 100644 --- a/docs/content/reference/ransomware.md +++ b/docs/content/reference/ransomware.md @@ -24,7 +24,7 @@ Files are "encrypted" in place with a simple bit flip. Encrypted files are renam This is a safe way to simulate encryption since it is easy to "decrypt" your files. You can simply perform a bit flip on the files again and rename them to remove the appended `.m0nk3y` extension. -This is sufficient to mock a ransomware attack on your network as your files are left unusuable and are renamed with a different extension, similar to the way that many ransomwares act. As this is a simulation, your security solutions should be triggered to notify and prevent these changes from taking place. +This is sufficient to mock a ransomware attack on your network as the data in your files has been manipulated (temporarily leaving them unusuable) and are renamed with a different extension, similar to the way that many ransomwares act. As this is a simulation, your security solutions should be triggered to notify and prevent these changes from taking place. ## Which files are encrypted?