The examinations mentioned in this report were conducted by examining the raw data that
was obtained from several sources. By analyzing the data, information was obtained to put
together a reasonable understanding of the collected data. As an organization continues to expand
and implement its business strategies, it is critical to consider its security infrastructure. The
security infrastructure needs to consider the implications of internal and external threats to the
organization. In most cases, the security risk are far more vulnerable to internal threats than they
are from external threats. Internal threats may be detected by observing their behavioral patterns.
For instance, an employee may come to the office early, when nobody has arrived or stay after,
when most people have left for the day to collect sensitive information. Additionally, a deviation
, for normal patterns may also be a cause for concern for employees who might decide to connect
to company systems via VPN, when in the past they have never been accustomed to do this
[ CITATION Uni212 \l 1033 ].
As far as external threats go, malware is by far one of the most common external threats,
it can cause massive disruptions and requires significant recovery efforts [ CITATION Sou13 \l
1033 ]. Malware includes viruses, Trojan horses, adware, backdoors, spyware, and other
malicious systems that are intended to disrupt and steal critical information. Because of their
execution privileges, executable files are the most common carriers of malware [CITATION
Bio \l 1033 ]. Developers of malware use special coding methods to go undetected by
antimalware techniques. The most significant instance of malware is social engineering, which
leverages employees within the organization that may willing or unwilling participants in a
scheme to infiltrate the organizations systems. The challenge with modern attacks of malware, is
that they are specifically designed to spread through systems in stealth mode, and not being
detected until after it is too late [ CITATION Sou13 \l 1033 ]. As a means of mitigating the risks
of malware, several applications have been created to detect the malicious content at the time of
execution. It is critical to use several layers of protection to mitigate the risks of malware,
because one level of protection may not be sufficient for the different methods of malware that
exists [CITATION Uni211 \l 1033 ].
Lab Report and Analysis of the VirusTotal Lab
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.