logo

Business Continuity Plan and Disaster Recovery Plan

5 Pages836 Words345 Views
   

Added on  2020-04-21

Business Continuity Plan and Disaster Recovery Plan

   Added on 2020-04-21

ShareRelated Documents
Running head:BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANBusiness Continuity Plan and Disaster Recovery PlanName of the StudentName of the UniversityAuthor Note
Business Continuity Plan and Disaster Recovery Plan_1
1BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLANThe hackers for hiding their malwares from Antivirus (AV) software use some very basictechniques. However, other than those methods there are several other advanced unintelligiblemethods, with new processes and technologies for detecting the malwares. In this report, we aregoing to discuss some of the techniques used by malware developers that enable them to disguisetheir codes for preventing them to be analyzed. 1. Obfuscation: It is one of the classic methods of cancelling a malware attack. In thismethod, the malware authors conceal the payload in a manner so that it will not be detected bythe IDS (Marpaung, Sain & Lee, 2012). 2. String manipulation: String manipulation is another effective technique of bypassingthe malware detector. In this method, the malware command is slightly altered. Different stringsare combined and manipulated with character substitution so that it is not detected by theintrusion detection system (Marpaung, Sain & Lee, 2012). 3. Stealth Malware: One of the primitive techniques that are used by the malwaredevelopers in order to escape being detected is the stealth Malware. This malware is able toconceal its sign and traces very intelligently after modifying the data sources of the system (Rad,Masrom & Ibrahim 2012). 4. Encrypted malware: Malware authors have always worked on improving the programfor escaping the code analyzer and technicians. Encrypted malware is such a technique that canescape detection as the malware code inserted into a system is generally encrypted and isdecrypted in their place of action (Rad, Masrom & Ibrahim 2012).
Business Continuity Plan and Disaster Recovery Plan_2

End of preview

Want to access all the pages? Upload your documents or become a member.