Monday, May 6, 2019

Malware Forensic Computing Assignment Example | Topics and Well Written Essays - 2500 words

Malware Forensic Computing - Assignment Example ready reckoner forensics or cyber forensics is a very authoritative topic in breeding systems and net lams management. Forensics is the structured procedure of gathering, examining and showing facts and evidences to the dally of law, and thus, forensic computing is defined as the discipline that combines elements of law and computer science to collect and prove selective information from computer systems, networks, tuner communications, and storage devices in a way that is admissible as evidence in a court of law (US-CERT 2008). This involves the seeking, locating and securing the electronic data so as to provide evidence. This electronic or magnetically en mandated data may include text messages, databases, pictures, e-mail, websites, spyware, malware, and so on. The evidence collected is strong and indisputable as compared to any other branch of forensic science because a copy that is made of the collected data is identical to t he actual data and there is no room left for dispute. The whole concept revolves about the idea that a structured investigation is carried out to find out what exactly happened to the computer, when it happened, how it happened, and who did it. This is just wish well solving a murder case and performing postmortem. The operator does not know that the evidence information is transparently being created and stored by the computers operating system which can only be extracted through computer forensics software tools and techniques. ... The crimes include misuse of computer systems, attack on computer systems, utilize a computer system to work against another system, failure of a computer system, and the list continues. Computer forensics certification solutions focus not only on recovery but also on prevention of security threats in order to provide securer solutions that are quicker and cheaper than the conventional techniques. These solutions include usurpation detection syste m (IDS), internet security system, biometric security system, net privacy system, firewall set-ups, network disaster security system, identity theft prevention system, identity management security system, and so on (Vacca 2005 146). 2.2. Malware Forensics Malware is the malicious code that computer intruders use to do a cyber attack, and malware forensics is the forensic computing techniques used by the investigators to detect and analyze this malicious code or malware (Ligh et al. 2010). Since cyber attackers are becoming increasingly aware if computer forensics techniques, they are blueprint much more sophisticated malicious codes that are at times hard to detect and analyze. Casey, Malin and Aquilina (2008) extract that By employing techniques that thwart reverse engineering, encode and conceal network traffic, and minimize the traces left on single file system, malicious code developers are making both discovery and forensic analysis both difficult. 2.2.1. Types of Malware Th e closely common instances of malware are the viruses, worms, Trojan horses, scareware, and exploits. Viruses get installed in the computer files through email scams, websites, downloads, etc. Worms work the same way as viruses. Scareware is a malware that

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.