{"id":78320,"date":"2021-12-01T09:53:21","date_gmt":"2021-12-01T09:53:21","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2021\/12\/01\/2-2-malware-analysis-benefits-in-incident-response-name-syam-chandu-koya\/"},"modified":"2021-12-01T09:53:21","modified_gmt":"2021-12-01T09:53:21","slug":"2-2-malware-analysis-benefits-in-incident-response-name-syam-chandu-koya","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2021\/12\/01\/2-2-malware-analysis-benefits-in-incident-response-name-syam-chandu-koya\/","title":{"rendered":"2 2 Malware Analysis Benefits in Incident Response Name: Syam Chandu Koya"},"content":{"rendered":"<p>2<\/p>\n<p> 2<\/p>\n<p> Malware Analysis Benefits in Incident Response<\/p>\n<p> Name: Syam Chandu Koya<\/p>\n<p> Due Date: July 25, 2021<\/p>\n<p> Malware Analysis Benefits in Incident Response<\/p>\n<p> Digital forensics has revealed crucial features that help cybersecurity businesses design equipment that prevents unauthorized users from exploiting a system, web application, or gadget. Malware attackers\u00a0and hijackers are proficient at forging their way into an individual&#8217;s or business owner&#8217;s equipment or system. However, digital forensics has gathered information that computer security may utilize to keep malware attackers from accessing a device or network (Kuntz). Cybersecurity systems can discover relevant information to safeguard and consistently scan systems\u00a0to ensure no other persons are present, based on trends seen in how malware attackers\u00a0and hijackers obtain, erase, or manipulate information. Therefore this paper is going to shed light on my final project proposal, which will be how malware analysis benefits incident response<\/p>\n<p> Malware forensic tools protect systems from external attacks. This is because malware nowadays can be extremely smart, specialized, complicated and commercialized, and extensible for large-scale attacks. The research will focus on malware analysis, an essential part of an incident management operation because malware is always the foundation\u00a0of many data breaches. Malware analysis is necessary because it assists respondents in determining the scope of a malware-related occurrence and identifying other hosts or systems that may be compromised quickly (Spring, 2018, p.412). Malware analysis can provide practical knowledge that can assist an institution in better minimize weaknesses abused by malware attackers\u00a0and avoid further infection. Regardless of whether it is\u00a0managed by a specialized internal system or a secure and trustworthy provider, incident management procedures are crucial for a successful defense policy. From resources assessment and planning to technological investigations and control, the incident response has various aspects. Still, malware analysis is one sector of cybersecurity that has grown and is\u00a0immensely important to the operation. The research will be carried out in one of the leading telecommunication companies within the nation so that we can be able to gain both qualitative and quantitative data that supports the importance of malware analysis in incident response within any given organization or institution.<\/p>\n<p> References<\/p>\n<p> Kuntz, M., Tong, Y., &amp; Lovaas, P. Challenges and Strategies for Malware Analysis for Incident Response and Prevention.<\/p>\n<p> Spring, J. M., &amp; Pym, D. (2018, October). Towards scientific incident response. In\u00a0International Conference on Decision and Game Theory for Security\u00a0(pp. 398-417). Springer, Cham.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2 2 Malware Analysis Benefits in Incident Response Name: Syam Chandu Koya Due Date: July 25, 2021 Malware Analysis Benefits in Incident Response Digital forensics has revealed crucial features that help cybersecurity businesses design equipment that prevents unauthorized users from exploiting a system, web application, or gadget. Malware attackers\u00a0and hijackers are proficient at forging their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-78320","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/78320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=78320"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/78320\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=78320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=78320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=78320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}