Q Define and discuss malware analysis, and the primary motive for conducting malware analysis Home, - Comment on the role of malware in cyber-attacks Question: The number of cyber-attacks is increasing substantially. Cyber-attacks target government, military, public and private sector, and focus on individuals and organizations to extract valuable information. Most of these attacks use malicious software (also called malware) to infect their targets. It is therefore important to have the knowledge, skills, and tools to analyse malicious software to detect, investigate and defend against these attacks. Based on your understanding of malware analysis, answer the following questions: i) Comment on the role of malware in cyber-attacks. Answer: Crucial role is played by malware in cyber attacks a) Malware provide the platform for the hackers to hack the private information of the users stored in the systems of the users. It is a type of cyber attack through which an attacker can get access to the private information of the target user and harm the user over the internet by misusing such information. b) The hackers use the malware to hack the target user sensitive data such as access to bank accounts of the users and their login id and passwords. c) Malware also play a crucial role in infecting the system of the user and then the system can be used for cryptocurrencies like bit coin. d) They can play role in the initiation of denial of the service attack. e) They can play role in spying on the system of the user. ii) Define and discuss malware analysis, and the primary motive for conducting malware analysis. Answer: DefinitionMalware analysis is a tool used to detect the suspicious files which the hacker installs in the system to hack the private information of the target user [1]. BenefitsThe malware analysis tool helps to identify the procedure which is used to activate malware and the target file which the hacker is intended to harm. The tool provides the security to the users over the internet from the malicious users by using count measures for the prevention from the vulnerabilities to converting into threats and preventing the loss of the sensitive information of the users.Primary motive of conducting malware analysis isa) Triaging of incidents with their level of severityb) Detection of vulnerabilities in the systemc) Detection of malwared) To prepare incident response by detecting threats and placing remedies in place iii) Why must malware analysis be conducted in an isolated environment? Justify your answer. Answer: Isolated environment must be there for the analysis of the malware to protect the injection of the malicious code into the applications of the system and for the encryption of the malicious code. The malware analysis in real environment can affect the working of the system so, it must be done in separate environment only. iv) Define and evaluate the classification techniques for malware analysis Answer: Malware analysis techniques can be classified in three categories.Static analysisDynamic analysisHybrid analysis Static analysisThe examination of the files is done in the static analysis in order to find the malicious intent in the file. The malicious infrastructure can be identified in this.The code is not run in the static analysis Dynamic analysisThe malicious code is run in the isolated environment in case of the dynamic analysis. The malware in action is watched by the users but it is not able to infect the system as it is conducted in virtual environment. The true nature of the threat can be detected by using this analysis. Hybrid analysis The indicators of the compromise can be detected by this technique by using the both the static examination of file as well as running of the actual code. The pros of both approaches can be accessed in this technique. Related: Comment on the role of malware in cyber-attacks Use of machine learning in cyber security Demonstrate the use of CRUNCH tool Discuss Session Hijacking attacks and countermeasures Discuss predictive data analysis in cyber security Advise a Preventative system against data breach
Related :- Q What are the key features of the objection what are the key features of the objection - what are the key features of the objection and appeal process against the commissioner's decision Q What will be the likely outcome against Bill what will be the likely outcome against bill - Business And Corporate Law - determine if these companies are ideal to invest in on behalf of their clients. Q Calculate the taxable value of fringe benefit calculate the taxable value of fringe benefit - calculate the taxable value of the fringe benefit using the statutory formula Q Discuss statutory provisions and common law discuss statutory provisions and common law - discuss amounts would be as an allowable deduction against assessable income Q What are the relevant franking account entries what are the relevant franking account entries - what are the relevant franking account entries for abc co and xyx co Q Difference between net capital loss and capital loss? difference between net capital loss and capital loss - what difference between net capital gain and capital gain and between net capital loss and capital loss Q What is Butler Tourism Area Life cycle? What is Butler Tourism Area Life cycle? Explain and give an example from the tourism context. Q Critically appraise the coefficient of determination critically appraise the coefficient of determination, population regression function and the sample regression function Q What are the potential solutions of MC? which pair of variables are likely to cause multicollinearity (mc)? what are the potential solutions of mc? Q Discuss whether Robert is a resident of Australia discuss whether robert is a resident of australia - discuss whether robert is a resident of australia for tax purposes and how his income would be taxed