1 MALWARE AND COUNTERMEASURES Privacy and Security Implications OneoftherecentmalwareattackwhichhasbeenwitnessedistheSharingof unprivileged access by Microsoft Windows. This particular attack is mainly a dangerous one where the remote possess one or even more than one shares of Windows which can be hugely accessed with the help of network with all the provided credentials. It can even allow any particular attacker for either reading or rather writing upon any data which are very much credential depending upon all the rights which have beenwidely shared (Inc, 2019). Prevention from such attack For restricting such an access under the Windows, first the Explorer is to be opened and then a right click is to be done upon each share and after going to the sharing tab the ‘permissions’ option is to be clicked upon. All the vulnerabilities in the Microsoft Windows SMB Shares Unprivileged Access is seen to be very much prone to all the positive reports which are totally false by most of the solutions of the vulnerability assessment. AVDS is totally alone in utilizing a particular testing based upon behavior which has the capability of directly eliminating this issue (Yeo, 2013). For all other security consultants of VA tools will be mostly recommending for the confirmation by observing directly. In any case, it has been seen that the procedures of penetration testing for particularly the discovery of several vulnerabilities will be producing the highest accuracy rate of discovery. It is to be only remembered that the infrequency of such an expensive form of this particular testing may degrade its respective value.
2 MALWARE AND COUNTERMEASURES References Inc,B.(2019).FindingandFixingVulnerabilitiesinMicrosoftWindowsSMBShares Unprivileged Access , a Medium Risk Vulnerability.Beyondsecurity.com. Retrieved 22 May2019,from https://www.beyondsecurity.com/scan_pentest_network_vulnerabilities_microsoft_windo ws_smb_shares_unprivileged_access Yeo, J. (2013). Using penetration testing to enhance your company's security.Computer Fraud & Security,2013(4), 17-20.