Malware Analysis: Malicious Software
Objective: Analyze malware trends and infection points, as well as methods for analyzing malware. This will include describing what is involved in a malware analysis environment, including tools, techniques, emerging developments in malware analysis.
Course Goals:
1. Develop and utilize policies, procedures, and technologies for incident analysis.
8. Incorporate analysis and response results into appropriate action plans, reporting information sharing, improvement cycles, and exposure elimination.
9. Incorporate analysis and response results into appropriate action plans, reporting, information sharing, improvement cycles, and exposure elimination.
10. Evaluate inter and intra organizational resources for incident investigation and response.
Scenario:
The use of computers and electronic devices to aid in the commission of crimes has seen explosive year over year growth. There is a high risk/reward potential for criminals in this environment compared to many other types of crimes. One of the tools of choice for criminals is malware, whether for theft of personal information, computing resources, or other forms of mischief.
Most organizations cease their effort once they have removed a malware threat or removed an infection. Our goal is to go much further and perform a full malware analysis of the incident. This means that we need a malware analysis procedures, environment, tools, and knowledge. Outline what is needed in terms of tools, procedures, and knowledge to analyze malware using both dynamic (behavioral) and static (code) analysis techniques – as well as identifying the potential vectors that delivered the payload that may allow for attribution.
The trend in malware is toward memory resident payloads, often with little or no footprint beyond active memory. This can create a complex situation where a minor slip up can ruin any chance at proper analysis. Obtaining malware artifacts from the wild can be an elite skill that very few people possess, particularly when it is memory based.
👀 Other Visitors are Viewing These APA Essay Samples:
- Week 7 Discussion: IT and Computer Science1 page/≈275 words | 4 Sources | APA | IT & Computer Science | Essay |
- Professional Ethics about Computer Hacking2 pages/≈550 words | 2 Sources | APA | IT & Computer Science | Essay |
- Terminology confusion. IT & Computer Science Essay1 page/≈275 words | 4 Sources | APA | IT & Computer Science | Essay |
- How Can Digital Forensic Tools Provide A Benefit In Risk Management1 page/≈275 words | 4 Sources | APA | IT & Computer Science | Essay |
- Investigate The Technologies Of E-Commerce IT-Organization4 pages/≈1100 words | 5 Sources | APA | IT & Computer Science | Essay |
- Disaster Recovery: Chairperson DMT Chairperson2 pages/≈550 words | 3 Sources | APA | IT & Computer Science | Essay |
- Ethical Dilemmas of Information Technology3 pages/≈825 words | 3 Sources | APA | IT & Computer Science | Essay |