Computer Science
Oklahoma State University Importance of Security Policy Conformance & Fileless Malware Discussion

Oklahoma State University

Question Description

I’m stuck on a Computer Science question and need an explanation.

Introduce and discuss a relevant issue regarding Fileless Malware.

Introduce and discuss a relevant issue regarding Security Policy Conformance.

300 words each question

The importance of peer-reviewed journals as references

In order to receive full credit discussion posts must include at least 2 scholarly references in APA format per question separated.

No plagarism.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Hello, I have uploaded the final copy. Please review the paper, and let me know in case you need any edits. Thank you for giving me an opportunity to serve you😍 😍

Detection and Prevention of Fileless Malware
Name
Institution
Professor
Course
Date

Introduce and discuss a relevant issue regarding Fileless Malware
Fileless malware refers to a form of malicious software that employs the use of
authentic programs to infect a computer. This malware does not depend on files to spread.
Besides, this malware does not leave a footprint (Smelcer, 2017). This makes it very
challenging to detect as well as remove this type of malware. Important to note is that this
malware type does not write or draft any part of its malicious activities to the computer’s hard
drive. As a result, the malware is highly resistant to the prevailing Anti-computer forensic
strategies. Also, it leaves very little evidence that digital forensics investigators could use to
establish illegitimate activities (Smelcer, 2017). Since this malware type is meant for working
in memory (RAM), it exists in the computer until the system is rebooted.
One of the main issues regarding fileless Malware is the detection and prevention of
fileless malware. Since it is impossible to scan files in order to detect this type of malware,
computer users can only rely on scanning memory as well as spotting of any malicious
behavior in their systems (Mansfield-Devine, 2017). Behavior monitoring is the most
effective approach to detecting this type of malware. This is because an...

TheGradeBooster (12683)
UIUC

Anonymous
The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

Anonymous
The tutor was knowledgeable, will be using the service again.

Anonymous
Awesome quality of the tutor. They were helpful and accommodating given my needs.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4