The examinations mentioned in this report were conducted by examining the raw data that
was obtained from several sources. By analyzing the data, information was obtained to put
together a reasonable understanding of the collected data. As an organization continues to expand
and implement its business strategies, it is critical to consider its security infrastructure. The
security infrastructure needs to consider the implications of internal and external threats to the
organization. In most cases, the security risk are far more vulnerable to internal threats than they
are from external threats. Internal threats may be detected by observing their behavioral patterns.
For instance, an employee may come to the office early, when nobody has arrived or stay after,
when most people have left for the day to collect sensitive information. Additionally, a deviation
, for normal patterns may also be a cause for concern for employees who might decide to connect
to company systems via VPN, when in the past they have never been accustomed to do this
[ CITATION Uni212 \l 1033 ].
As far as external threats go, malware is by far one of the most common external threats,
it can cause massive disruptions and requires significant recovery efforts [ CITATION Sou13 \l
1033 ]. Malware includes viruses, Trojan horses, adware, backdoors, spyware, and other
malicious systems that are intended to disrupt and steal critical information. Because of their
execution privileges, executable files are the most common carriers of malware [CITATION
Bio \l 1033 ]. Developers of malware use special coding methods to go undetected by
antimalware techniques. The most significant instance of malware is social engineering, which
leverages employees within the organization that may willing or unwilling participants in a
scheme to infiltrate the organizations systems. The challenge with modern attacks of malware, is
that they are specifically designed to spread through systems in stealth mode, and not being
detected until after it is too late [ CITATION Sou13 \l 1033 ]. As a means of mitigating the risks
of malware, several applications have been created to detect the malicious content at the time of
execution. It is critical to use several layers of protection to mitigate the risks of malware,
because one level of protection may not be sufficient for the different methods of malware that
exists [CITATION Uni211 \l 1033 ].
Lab Report and Analysis of the VirusTotal Lab
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper helperatsof1. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €7,32. Je zit daarna nergens aan vast.