Description
incident response: Response strategies:
Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?
Please NO PLAGIARISM
Explanation & Answer
Attached.
Disaster Recovery
Outline
Focus of the essay: This paper is a research for the newer malware variant and how such
malware works.
The essay provides:
1. Newer Malware Variant Identified
2. How “Agent Smith” Android Mobile Malware Works
3. Explaining information from At Least One Other Vendor
Running head: DISASTER RECOVERY
1
Disaster Recovery
Student’s Name
Institution
Date
DISASTER RECOVERY
2
Introduction
Security awareness has been increasingly growing in all companies globally, but the
threat landscape is ever-changing every day. The rapid changing security landscape is a
challenge to many of the organization to keep up and stay up-to-date. Due to the many existing
and emerging threats a cybersecurity incident response plan and strategies are necessary.
Despite of organization position in cyber security, having a good, established, and effective plan
of action in case of a security incident that can be executed immediately is crucial to limit
damages to company reputations and cost of the incident. You can’t have an effective plan if you
have no understanding of the security landscape. This paper is a research for the newer malware
variant and how such malware works.
Newer Malware Variant Identified
A malware can be defined as a collective name used to describe various malicious
software, file or program including spyware and ransomware that cause harm to computer users.
Such malicious software or program can be used to accomplish or perform various functions
such as hijacking or altering core computing functions, stealing, encryption, and even monitoring
users. Malware is word in the digital world now commonly used (Rouse, 2019). Taking a look
on various reports on security threat posted by major malware containment vendor McAfee and
Symantec...