Ask a question from expert

Ask now

Business Continuity Plan and Disaster Recovery Plan : Assignment

5 Pages995 Words142 Views
   

Added on  2020-04-15

Business Continuity Plan and Disaster Recovery Plan : Assignment

   Added on 2020-04-15

BookmarkShareRelated Documents
Running head: BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANBusiness Continuity Plan and Disaster Recovery PlanName of the StudentName of the UniversityAuthor Note
Business Continuity Plan and Disaster Recovery Plan : Assignment_1
1 BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANHackers use some of the most basic techniques for the hiding of their malware codesfrom the detection of antivirus software’s. This report discusses the most advanced options,which are used for by the hackers for the displaying of the new tactics and technology for thedetection of evasive malwares:Debuggers and anti-disassembly: Malware developers know the process, which isused by the malware research workers use and the tools that are used for the huntingof the threats. Researchers and programmers use disassemblers for the debugging ofwhat the code does (Lee & Park, 2016). There are many tools, which are used for thedetection of disassemblers, and debuggers many of which are included into thewindows functions. Rootkits: At the highest level of work, rootkits are used as a combination of tools andtechniques, which helps in the burrowing into the system, and successfully hide intothe operating system (Alazab et al., 2014). Processors inside computers have theprivilege of executing. These are exploited by the attackers into tricking the higherlevel programs to grant them the access privilege. In a windows or Linux environmentthere is the availability of user space and kernel space (Saracino et al., 2016). Thehighest level is the kernel space. If a malware needs to hide itself in the operatingsystem the files needs to be embedded into the kernel space rather than the user space.Code, DLL, and Process Injection: Processes injection and dynamic-link library(DLL) injection is a variety of techniques, which is used for the execution of codesunder the context of other procedures (Narudin et al., 2016). Malware developersoften makes use of these techniques to execute their codes in other windowsprocesses. They might inject codes into certain executable files of the windowssystem. By using this procedure, the malware detection software cannot make out ifthe program is a malware or not. It already knows that the file is not a malware but the
Business Continuity Plan and Disaster Recovery Plan : Assignment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Business Continuity Plan and Disaster Recovery Plan
|5
|836
|345

Business Continuity Planning and Disaster Recovery Planning
|5
|902
|133