Limited-time offer! Save up to 50% Off | Solutions starting at $6 each  

Business Continuity Plan and Disaster Recovery Plan

Added on - 21 Apr 2020

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 2 of 5 pages
Running head:BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANBusiness Continuity Plan and Disaster Recovery PlanName of the StudentName of the UniversityAuthor Note
1BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANThe hackers for hiding their malwares from Antivirus (AV) software use some very basictechniques. However, other than those methods there are several other advanced unintelligiblemethods, with new processes and technologies for detecting the malwares. In this report,we aregoing to discuss some of the techniques used by malware developers that enable them to disguisetheir codes for preventing them to be analyzed.1. Obfuscation: It is one of the classic methods of cancelling a malware attack. In thismethod, the malware authors conceal the payload in a manner so that it will not be detected bythe IDS (Marpaung, Sain & Lee, 2012).2. String manipulation: String manipulation is another effective technique of bypassingthe malware detector. In this method, the malware command is slightly altered. Different stringsare combined and manipulated with character substitution so that it is not detected by theintrusion detection system (Marpaung, Sain & Lee, 2012).3. Stealth Malware: One of the primitive techniques that are used by the malwaredevelopers in order to escape being detected is the stealth Malware. This malware is able toconceal its sign and traces very intelligently after modifying the data sources of the system (Rad,Masrom & Ibrahim 2012).4. Encrypted malware: Malware authors have always worked on improving the programfor escaping the code analyzer and technicians. Encrypted malware is such a technique that canescape detection as the malware code inserted into a system is generally encrypted and isdecrypted in their place of action (Rad, Masrom & Ibrahim 2012).
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document