Securing Enterprise Infrastructure
VerifiedAdded on 2022/08/09
|7
|1553
|24
AI Summary
In an essay, answer the following questions based on the readings from this module: -How do you determine the type and location of malware -present on the computer or device? Explain your rationale. In your opinion, do you think that vulnerabilities can be minimized in the future? Why or why not? Provide information from your readings to support your statements. Deliverables: Your essay should be 4-5 pages in length, not including the cover and reference pages
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURING ENTERPRISE INFRASTRUCTURE
Securing Enterprise Infrastructure
Name of the Student
Name of the University
Author’s Note
Securing Enterprise Infrastructure
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURING ENTERPRISE INFRASTRUCTURE
Malware is the malicious software, which is the common cyberattack where the malware
performs the unauthorized actions on the computer device. It encompasses multiple types of
malware attacks like spyware, command and control and ransomware (Min & Varadharajan,
2014). The malicious softwares or programs are developed for gaining access to the system and
cause damage to the network or system, where the victim is oblivious about the event. There are
multiple types of malware attack, which can harm the system and the sensitive data of the users.
This study aims to discuss the way in which the malware can be detected and how the malware
attack can be mitigated in future.
Using the antivirus will help in detecting the types and the location of the malware
effectively. The antivirus software will check the operating system. If the system and the
antivirus are up-to-dated, then it will check continuously whether any malicious content is there.
If the system is infected by any malware, the malicious program will send multiple
advertisements and pop-ups (Zhao et al., 2014). These types of malwares can be Malvertising or
Adware malware attack. If the user sees any new browser extension or any toolbar icon or item,
the user should never download or install those items as this can infect the system. If the web
browser, the user is currently searching for changes the home page of the website to any other
unexpected website while browsing, then there can be malicious content. The malware attack
will make the system of the user run slow and will consume the higher percentages of the
resources of the system (Das et al., 2016). If the users receive mail with unusual website links or
content, this can be the Trojan malware. When the user clicks on the links, they will be
redirected to another malicious website, which can cause the data loss.
If the system or the internet is inoperative because of the malware infection, the antivirus
software will boot the system to the safe mode with the networking or using the LAN. The user
Malware is the malicious software, which is the common cyberattack where the malware
performs the unauthorized actions on the computer device. It encompasses multiple types of
malware attacks like spyware, command and control and ransomware (Min & Varadharajan,
2014). The malicious softwares or programs are developed for gaining access to the system and
cause damage to the network or system, where the victim is oblivious about the event. There are
multiple types of malware attack, which can harm the system and the sensitive data of the users.
This study aims to discuss the way in which the malware can be detected and how the malware
attack can be mitigated in future.
Using the antivirus will help in detecting the types and the location of the malware
effectively. The antivirus software will check the operating system. If the system and the
antivirus are up-to-dated, then it will check continuously whether any malicious content is there.
If the system is infected by any malware, the malicious program will send multiple
advertisements and pop-ups (Zhao et al., 2014). These types of malwares can be Malvertising or
Adware malware attack. If the user sees any new browser extension or any toolbar icon or item,
the user should never download or install those items as this can infect the system. If the web
browser, the user is currently searching for changes the home page of the website to any other
unexpected website while browsing, then there can be malicious content. The malware attack
will make the system of the user run slow and will consume the higher percentages of the
resources of the system (Das et al., 2016). If the users receive mail with unusual website links or
content, this can be the Trojan malware. When the user clicks on the links, they will be
redirected to another malicious website, which can cause the data loss.
If the system or the internet is inoperative because of the malware infection, the antivirus
software will boot the system to the safe mode with the networking or using the LAN. The user
2SECURING ENTERPRISE INFRASTRUCTURE
can use the Autoruns programs and Process Explorer for testing for the type and the location of
the malware. If the users have the active antivirus software, this will help in detecting the
location of the malware and will attempt to block or remove the malware function (Mehra, Jain
& Uppal, 2015). Unchecking the malicious content in the rebooting and Autoruns can allow the
EXE files for running again and the antivirus program will scan and update about the malicious
function. Sometimes the kernel mode of the driver can be installed in the Device Manager for
blocking the antivirus. This shows usually under the Plug and Play Devices and the user needs to
set the Device Manager for showing the hidden devices if there is any in the system.
The vulnerabilities of the malware attack can be reduced in the future, as there are many
tools and software that potentially detects the malicious function and attempt to block those
functions (He, Chan & Guizani, 2015). There are multiple approaches for minimizing the
malware attack in the computer system such as:
The user must install security patches and security updates for protecting against the
malware attack. This is very essential for widely used and popular programs such as
QuickTime, Java and Adobe. The user should turn on the automatic software updates for
detecting any future attacks.
When the user receives any suspicious or unsolicited email or link, they should avoid
this. Most of the times, those are phishing content, which intended for appearing
legitimate for tricking the users for revealing the confidential information or downloading
the malicious content (Penning et al., 2014). The user must remember that any genuine
business never ask for log in credential or any pin.
The intruders spoof the popular websites frequently. Therefore, if the user notices any
unexpected things on the website such as website features and website URL, he or she
can use the Autoruns programs and Process Explorer for testing for the type and the location of
the malware. If the users have the active antivirus software, this will help in detecting the
location of the malware and will attempt to block or remove the malware function (Mehra, Jain
& Uppal, 2015). Unchecking the malicious content in the rebooting and Autoruns can allow the
EXE files for running again and the antivirus program will scan and update about the malicious
function. Sometimes the kernel mode of the driver can be installed in the Device Manager for
blocking the antivirus. This shows usually under the Plug and Play Devices and the user needs to
set the Device Manager for showing the hidden devices if there is any in the system.
The vulnerabilities of the malware attack can be reduced in the future, as there are many
tools and software that potentially detects the malicious function and attempt to block those
functions (He, Chan & Guizani, 2015). There are multiple approaches for minimizing the
malware attack in the computer system such as:
The user must install security patches and security updates for protecting against the
malware attack. This is very essential for widely used and popular programs such as
QuickTime, Java and Adobe. The user should turn on the automatic software updates for
detecting any future attacks.
When the user receives any suspicious or unsolicited email or link, they should avoid
this. Most of the times, those are phishing content, which intended for appearing
legitimate for tricking the users for revealing the confidential information or downloading
the malicious content (Penning et al., 2014). The user must remember that any genuine
business never ask for log in credential or any pin.
The intruders spoof the popular websites frequently. Therefore, if the user notices any
unexpected things on the website such as website features and website URL, he or she
3SECURING ENTERPRISE INFRASTRUCTURE
must be cautious and never should enter any confidential data. For ensuring that the
website is authentic, the user should check the URL carefully and must check that that
site is using HTTPS.
Before installing any software on the device or the system including trail or free version,
the user should look into the software and the review of the software is legitimate.
Multiple people continue for using the easily-guessed login credential for all their
accounts in their system. This is imperative that the user is using the unique and strong
passwords for every account in their system (Lysne et al., 2016). Where possible, the user
should enable the two-factor authentication for securing thee access to the accounts in
future. The user must turn on the firewall, which will determine the data, which can
access to the system. Therefore, the user needs to ensure that the firewall is properly
turned on configured.
By using the sophisticated antivirus program or software, which will keep the watchful
eye on the device will protect and secure the system against any malware attack (Sittig, &
Singh, 2016). With the popular antivirus, the user can clock and prevent the infiltration
before it occurs, as this is the useful baseline of defense against the malware attack.
The malicious content needs the full access to the system for running properly. Therefore,
the user will need to use their account controls for limiting the program without their
permission (Min & Varadharajan, 2014). When the user will be notified of the software
or program, which is attempting for making the changes to the device, the user can be
careful about the notification and get help for stopping the malicious program from
installing.
must be cautious and never should enter any confidential data. For ensuring that the
website is authentic, the user should check the URL carefully and must check that that
site is using HTTPS.
Before installing any software on the device or the system including trail or free version,
the user should look into the software and the review of the software is legitimate.
Multiple people continue for using the easily-guessed login credential for all their
accounts in their system. This is imperative that the user is using the unique and strong
passwords for every account in their system (Lysne et al., 2016). Where possible, the user
should enable the two-factor authentication for securing thee access to the accounts in
future. The user must turn on the firewall, which will determine the data, which can
access to the system. Therefore, the user needs to ensure that the firewall is properly
turned on configured.
By using the sophisticated antivirus program or software, which will keep the watchful
eye on the device will protect and secure the system against any malware attack (Sittig, &
Singh, 2016). With the popular antivirus, the user can clock and prevent the infiltration
before it occurs, as this is the useful baseline of defense against the malware attack.
The malicious content needs the full access to the system for running properly. Therefore,
the user will need to use their account controls for limiting the program without their
permission (Min & Varadharajan, 2014). When the user will be notified of the software
or program, which is attempting for making the changes to the device, the user can be
careful about the notification and get help for stopping the malicious program from
installing.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4SECURING ENTERPRISE INFRASTRUCTURE
Through the network, the malware is being spread in the computer system. However,
preserving the records and information in the system involves making sure that they are
remaining free from the malware attacks. There will always the risk of the malware attack as the
technology is becoming advance and the hackers are also becoming strong using the technology
but the user needs to be careful about it. Following the best practices to minimize the malware
attack will make sure that the users build the secure computing habits in general, which will help
in protecting against the malware attack.
Through the network, the malware is being spread in the computer system. However,
preserving the records and information in the system involves making sure that they are
remaining free from the malware attacks. There will always the risk of the malware attack as the
technology is becoming advance and the hackers are also becoming strong using the technology
but the user needs to be careful about it. Following the best practices to minimize the malware
attack will make sure that the users build the secure computing habits in general, which will help
in protecting against the malware attack.
5SECURING ENTERPRISE INFRASTRUCTURE
References
He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and
defenses. IEEE Wireless Communications, 22(1), 138-144.
Lysne, O., Hole, K. J., Otterstad, C., Ytrehus, Ø., Aarseth, R., & Tellnes, J. (2016). Vendor
malware: detection limits and mitigation. Computer, 49(8), 62-69.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and
recovering from ransomware attacks. Applied clinical informatics, 7(02), 624-632.
Penning, N., Hoffman, M., Nikolai, J., & Wang, Y. (2014, May). Mobile malware security
challeges and cloud-based detection. In 2014 International Conference on Collaboration
Technologies and Systems (CTS) (pp. 181-188). IEEE.
Min, B., & Varadharajan, V. (2014, September). Feature-distributed malware attack: risk and
defence. In European Symposium on Research in Computer Security (pp. 457-474).
Springer, Cham.
Zhao, S., Li, X., Xu, G., Zhang, L., & Feng, Z. (2014, September). Attack tree based android
malware detection with hybrid analysis. In 2014 IEEE 13th International Conference on
Trust, Security and Privacy in Computing and Communications (pp. 380-387). IEEE.
Mehra, V., Jain, V., & Uppal, D. (2015, April). Dacomm: Detection and classification of
metamorphic malware. In 2015 Fifth International Conference on Communication
Systems and Network Technologies (pp. 668-673). IEEE.
References
He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and
defenses. IEEE Wireless Communications, 22(1), 138-144.
Lysne, O., Hole, K. J., Otterstad, C., Ytrehus, Ø., Aarseth, R., & Tellnes, J. (2016). Vendor
malware: detection limits and mitigation. Computer, 49(8), 62-69.
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and
recovering from ransomware attacks. Applied clinical informatics, 7(02), 624-632.
Penning, N., Hoffman, M., Nikolai, J., & Wang, Y. (2014, May). Mobile malware security
challeges and cloud-based detection. In 2014 International Conference on Collaboration
Technologies and Systems (CTS) (pp. 181-188). IEEE.
Min, B., & Varadharajan, V. (2014, September). Feature-distributed malware attack: risk and
defence. In European Symposium on Research in Computer Security (pp. 457-474).
Springer, Cham.
Zhao, S., Li, X., Xu, G., Zhang, L., & Feng, Z. (2014, September). Attack tree based android
malware detection with hybrid analysis. In 2014 IEEE 13th International Conference on
Trust, Security and Privacy in Computing and Communications (pp. 380-387). IEEE.
Mehra, V., Jain, V., & Uppal, D. (2015, April). Dacomm: Detection and classification of
metamorphic malware. In 2015 Fifth International Conference on Communication
Systems and Network Technologies (pp. 668-673). IEEE.
6SECURING ENTERPRISE INFRASTRUCTURE
Das, S., Xiao, H., Liu, Y., & Zhang, W. (2016, May). Online malware defense using attack
behavior model. In 2016 IEEE International Symposium on Circuits and Systems
(ISCAS) (pp. 1322-1325). IEEE.
Das, S., Xiao, H., Liu, Y., & Zhang, W. (2016, May). Online malware defense using attack
behavior model. In 2016 IEEE International Symposium on Circuits and Systems
(ISCAS) (pp. 1322-1325). IEEE.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.