Business Continuity Plan and Disaster Recovery Plan : Assignment

Added on - 15 Apr 2020

  • 5

    pages

  • 995

    words

  • 5

    views

  • 0

    downloads

Showing pages 1 to 2 of 5 pages
Running head:BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANBusiness Continuity Plan and Disaster Recovery PlanName of the StudentName of the UniversityAuthor Note
1BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANHackers use some of the most basic techniques for the hiding of their malware codesfrom the detection of antivirus software’s. This report discusses the most advanced options,which are used for by the hackers for the displaying of the new tactics and technology for thedetection of evasive malwares:Debuggers and anti-disassembly:Malware developers know the process, which isused by the malware research workers use and the tools that are used for the huntingof the threats. Researchers and programmers use disassemblers for the debugging ofwhat the code does (Lee & Park, 2016). There are many tools, which are used for thedetection of disassemblers, and debuggers many of which are included into thewindows functions.Rootkits:At the highest level of work, rootkits are used as a combination of tools andtechniques, which helps in the burrowing into the system, and successfully hide intothe operating system(Alazab et al., 2014). Processors inside computers have theprivilege of executing. These are exploited by the attackers into tricking the higherlevel programs to grant them the access privilege. In a windows or Linux environmentthere is the availability of user space and kernel space (Saracino et al., 2016). Thehighest level is the kernel space. If a malware needs to hide itself in the operatingsystem the files needs to be embedded into the kernel space rather than the user space.Code, DLL, and Process Injection:Processes injection and dynamic-link library(DLL) injection is a variety of techniques, which is used for the execution of codesunder the context of other procedures(Narudin et al., 2016). Malware developersoften makes use of these techniques to execute their codes in other windowsprocesses. They might inject codes into certain executable files of the windowssystem. By using this procedure, the malware detection software cannot make out ifthe program is a malware or not. It already knows that the file is not a malware but the
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document