100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary DFC 640 Project 2 Final Incident Response Report Malware Forensics.docx DFC 640 Project 2 Final Incident Response Report: Malware Forensics University of Maryland “ Global Campus DFC 640: Advanced Forensics Table of Contents DFC 640 Project 2 Fina $7.49   Add to cart

Summary

Summary DFC 640 Project 2 Final Incident Response Report Malware Forensics.docx DFC 640 Project 2 Final Incident Response Report: Malware Forensics University of Maryland “ Global Campus DFC 640: Advanced Forensics Table of Contents DFC 640 Project 2 Fina

 32 views  0 purchase
  • Course
  • Institution

DFC 640 Project 2 Final Incident Response Report Malware F DFC 640 Project 2 Final Incident Response Report: Malware Forensics University of Maryland “ Global Campus DFC 640: Advanced Forensics Table of Contents DFC 640 Project 2 Final Incident Response Report: Malware Forensics.............

[Show more]

Preview 2 out of 6  pages

  • June 13, 2021
  • 6
  • 2020/2021
  • Summary
avatar-seller
DFC 640

Project 2 Final Incident Response Report: Malware Forensics


University of Maryland – Global Campus

DFC 640: Advanced Forensics



Table of Contents

DFC 640 Project 2 Final Incident Response Report: Malware Forensics....................1

Executive Summary...........................................................................................................3

Lab Report and Analysis of the VirusTotal Lab...............................................................3

Lab Report and Analysis of the Encase Lab....................................................................3

Summary of Findings........................................................................................................4

Recommendations..............................................................................................................5

References...........................................................................................................................6



Executive Summary

The examinations mentioned in this report were conducted by examining the raw data that

was obtained from several sources. By analyzing the data, information was obtained to put

together a reasonable understanding of the collected data. As an organization continues to expand

and implement its business strategies, it is critical to consider its security infrastructure. The

security infrastructure needs to consider the implications of internal and external threats to the

organization. In most cases, the security risk are far more vulnerable to internal threats than they

are from external threats. Internal threats may be detected by observing their behavioral patterns.

For instance, an employee may come to the office early, when nobody has arrived or stay after,

when most people have left for the day to collect sensitive information. Additionally, a deviation

, for normal patterns may also be a cause for concern for employees who might decide to connect

to company systems via VPN, when in the past they have never been accustomed to do this

[ CITATION Uni212 \l 1033 ].

As far as external threats go, malware is by far one of the most common external threats,

it can cause massive disruptions and requires significant recovery efforts [ CITATION Sou13 \l

1033 ]. Malware includes viruses, Trojan horses, adware, backdoors, spyware, and other

malicious systems that are intended to disrupt and steal critical information. Because of their

execution privileges, executable files are the most common carriers of malware [CITATION

Bio \l 1033 ]. Developers of malware use special coding methods to go undetected by

antimalware techniques. The most significant instance of malware is social engineering, which

leverages employees within the organization that may willing or unwilling participants in a

scheme to infiltrate the organizations systems. The challenge with modern attacks of malware, is

that they are specifically designed to spread through systems in stealth mode, and not being

detected until after it is too late [ CITATION Sou13 \l 1033 ]. As a means of mitigating the risks

of malware, several applications have been created to detect the malicious content at the time of

execution. It is critical to use several layers of protection to mitigate the risks of malware,

because one level of protection may not be sufficient for the different methods of malware that

exists [CITATION Uni211 \l 1033 ].


Lab Report and Analysis of the VirusTotal Lab

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$7.49
  • (0)
  Add to cart