MITS5004 IT Security Assignment 2: Malware Analysis Research Report

Verified

Added on  2022/10/04

|13
|933
|239
Report
AI Summary
This report critically evaluates a research paper titled "Malware attack and Malware Analysis: A Research" by Chakraborty. The paper investigates the impact of malware and security threats on organizational performance, focusing on various attack types like Trojan horses, worms, spyware, and adware. The research employs inductive and qualitative approaches, collecting secondary data through literature reviews from journals and websites. The analysis utilizes static and dynamic methods to understand malware and security issues. The findings highlight that malware poses a serious security threat, with the lack of proper configuration as a major contributing factor. The paper concludes by emphasizing the importance of detecting and handling malware signals, offering tools to manage data privacy. The report summarizes the key points of the research paper, its methodologies, and its conclusions regarding malware and security threats in computer networks, offering tools to mitigate them.
Document Page
A U T H O R N A M E : C H A K R A B O R T Y
A R T I C L E : M A LWA R E AT TA C K A N D
M A LWA R E A N A LY S I S : A R E S E A R C H
Threat attack and malware
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Malware is a common security attack that
directly impacts on the personal data of the
users and companies.
The major focus of this research is to examine
the impact of security threats, attacks, and
malware on organizational performance.
This research will include numerous sections
such as the intention of the paper, research
methods used, key issues highlighted by the
researchers and findings of the paper.
Document Page
Intention of paper
The title of the paper is Malware attack and
Malware Analysis: A Research that was provided by
Soumen in the year 2015 [1].
According to the author, malware analysis is the
manner of evaluating the impacts of security
threats and malware signals on the personal
information of the consumers.
There are various kinds of malware attacks faced
by the companies while accessing computer
networks through unauthorized networks including,
Trojan horse, worms, spyware and adware.
Document Page
Research methods
There are following research methods used in
the paper:
Research approach
Research design
Data collection
Data analysis
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research approach
It is identified that the inductive approach is
used for pooling the collected data towards
research objectives and goals while deductive
research is to provide an effective hypothesis
of the investigation.
Moreover, this methodology helped for
enhancing the reliability of data and
enhancing the quality of the investigation.
Document Page
Research design
The researchers used qualitative design while
conducting the investigation and collected data
from the previous papers and observation in
the context of malware attack.
It is argued that the use of qualitative design
supported the researchers for finding effective
points in the relation of malware and security
threats.
The qualitative design mainly allowed the
investigators to obtain subjective data about
malware and security threats [2].
Document Page
Data collection
In this research secondary data was obtained
by the writer due to the subjective behavior of
the research.
In order to obtain secondary data the writer
developed a literature review and adopted
information from the online websites, journal
papers and other resources.
Including this type of data, the researcher was
capable to find the risk factors that produce
malware and security risks in the computer
networks [3].
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Data analysis
Data analysis provides a way to understand
research concerns and manage the gaps from
the research.
In this article, the writer adopted two
methods for analyzing malware including
static method and dynamic technique.
Therefore, including such kinds of
methodologies the researcher was able to
achieve goals of the research and reached the
conclusion of the investigation.
Document Page
Findings of the paper
It is found that malware is a serious security
attack faced by the companies where the
criminals send unwanted signals to the systems
in order to enter into the computing devices.
This research also evaluated and analyzed the
key factors that lead to security-related
problems in the companies [4].
The highlighted tools are capable to identify the
viruses and traffic signals transferred by the
malware and manage the privacy of data in an
appropriate manner.
Document Page
Issues highlighted
In this paper, the researchers evaluated the
malware and security issues faced by the
consumers while including computer devices
and networks.
The lack of proper configuration is a major
problem that enhances security attacks and
malware activities in the systems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion of the paper
The researcher concluded that malware is a
kind of security threat that may affect the
personal information of the consumers.
This proposed paper observed and evaluated
the types of malware attacks and provided
effective tools by which the consumers can
detect and handle malware signals from the
computing devices.
Document Page
Conclusion
From this study, it may be summarized that
malware is a major problem that may produce
data breach issues in companies.
The selected journal provided depth
information about malware and highlighted
effective tools for finding the key points related
to malware.
This report critically evaluated and explored
the malware and security threats related to the
computer devices and obtained the effective
points in the context of malware.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]