Malware Attack and Malware Analysis: A Research

   

Added on  2022-10-04

9 Pages2293 Words146 Views
RESEARCH PAPER
0
NAME STUDENT ID
Threats attacks and
malware
Article: Chakraborty, S.,
(2019) Malware attack and
Malware Analysis: A
Research
Malware Attack and Malware Analysis: A Research_1
RESEARCH PAPER
Table of Contents
Introduction................................................................................................................ 2
The intention of the paper.......................................................................................... 2
Research methods...................................................................................................... 3
Research approach.................................................................................................. 3
Research design...................................................................................................... 4
Data collection........................................................................................................ 4
Data analysis........................................................................................................... 4
Findings or results...................................................................................................... 5
Issues highlighted....................................................................................................... 5
Conclusion of the article............................................................................................. 5
Conclusion.................................................................................................................. 6
References................................................................................................................. 7
1
NAME STUDENT ID
Malware Attack and Malware Analysis: A Research_2
RESEARCH PAPER
Introduction
In this generation, the rate of security threats is increasing quickly where
the attackers transfer the fraud signs to the computer networks used by the
organizations. Malware is a security threat which directly impacts on the
individual information of the users and businesses [1]. Malware is software
that helps the criminals to achieve hacking activities in the companies and
business communities. The major focus of this research is to examine the
impact of security threats, attacks, and malware on organizational
performance. For better understanding, a journal paper will be included
and evaluated based on the malware attacks. This article will comprise
many sections such as the information of the article, research approaches
used, key issues tinted by the investigators and findings of the paper.
The intention of the paper
The name of the article is Malware attack and Malware Analysis: A
Research that was provided by Soumen [1]. The significance of this paper is
to identify and evaluate the impacts of a malware attack on the computer
systems used by the users. According to the author, malware analysis is the
manner of evaluating the impacts of security threats and malware signals
on the personal information of the consumers. It is identified that malware
is software used by hackers for controlling and accessing private data of the
users without taking their authorization [2].
The researchers identified that with the enhancement of internet
connections many consumers are moving towards computer networks and
systems due to which the hackers are able to attack on these networks and
access the computing devices used by the consumers. In recent years,
malware has been defined as a security attack that has the potential to
perform data breach-related issues in business communities. MacAfee
identified thousands of viruses and malware signals from the computer
2
NAME STUDENT ID
Malware Attack and Malware Analysis: A Research_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware attack and Malware Analysis: A Research
|13
|933
|239

Types of computer malware
|6
|763
|375

Malware and their Analysis
|6
|2946
|81

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15

Trojan Horse Attack
|11
|2804
|324

Malicious Software Protection Policy
|6
|1728
|181