Need induvidual responses of two discussions of 150 words each for below posts.

Need induvidual responses of two discussions of 150 words each for below posts.Responses will be posted after assignation

here are the posts

Post 1

Malware Attack on Systems

The term malware is used to describe malicious software usually embedded within computer networks, whose functioning could have catastrophic or negative impacts on the overall system security. One example of a malware is a Trojan horse, which is usually attached to organizations systems giving these organizations the perception that it could be useful for legitimate uses while the opposite is true. In most cases, Trojan horse malware is usually embedded to computer networks mainly through social engineering attacks. Organizations employees are usually targeted in providing entry for this given malware to the organizational systems (Kunwar & Sharma, 2016). Trojan horse usually manifest itself in a way that seems beneficial to organizational network, yet it usually result in compromising organizational security.

Once the Trojan horse is embedded to the overall organizational systems, it could have diverse impacts. Some of the key strategies adopted by the Trojan horse malware in conducting its operations include data blocking, data deletion, data copying, data modification and causing the overall disruption of the computer security (Kunwar & Sharma, 2016). Trojan horse could further work in collaboration with other existing malware, hence providing an overall devastating impact to the effective functioning of the organizational systems.

There are proactive ways of preventing the functioning of Trojan horses. Regular system scanning could be one of the ways of mitigating against the occurrence of threats associated with this malware (Marcelli, Restifo, Sanchez, & Squillero, 2017). Notably, installation of anti-malware, use of firewall and educating employees could provide proactive ways of dealing with this given malware. Educating employees could provide an appropriate way of addressing social engineering related threats. Also, it is appropriate that system users should consider downloading and installing applications and software from only trusted sources.

References

Kunwar, R. S., & Sharma, P. (2016, March). Malware Analysis: Tools and Techniques. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (pp. 1-4).

Marcelli, A., Restifo, M., Sanchez, E., & Squillero, G. (2017, March). An evolutionary approach to hardware encryption and trojan-horse mitigation. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 (pp. 1593-1598). IEEE.

Post 2

Phishing:

It can be seen that cybercrimes are increasing in the malware. Their many ways by which it can be cybercrime is done. The major type of technology that can be put forward is by the help of malware. It is seen that Malware is the software that is injected in the computers for accessing or destroying certain data. The most common type of malware that can be put in contrast is Phishing. Phishing is generally a cybercrime in which the intruders by taking the help of the text messages or emails access the computers of the victims. This is mainly done to obtain certain crucial data which are like the password, the usernames and many more. This is mainly carried by the process of email spoofing or continuous messaging. The users are normally convinced to go to a fake website for filling up all their personal information. Hence after the individual fills up all the data are retrieved by the users. This technique is mainly used for deceiving the users. It is generally seen that this type of crime is often attempted by teenagers. There are certain types of Phishing that can be taken in contrast. The first type of phishing is the Spear Phishing. This type of phishing generally done on the specific organization or specific user (Sampat, Saharkar, Pandey & Lopes, 2018). For increasing the probability of the success, it is seen that this type of phishing technique is done. The next type of phishing is Whaling. This phishing is done to the senior authorities of the organization or it is seen that they generally target high-profile individuals. The next type of phishing other than the Whaling is the Clone Phishing. All this type of phishing is generally used for retrieving data from the organization or from the individuals who are having a high rated profile.

Social Engineering:

It is seen that social engineering is generally an attack vector that totally relies on the interaction of the human and often makes involvement in manipulating the individuals by breaking all the general procedures of security. This process is mainly done to gain proper access to the systems, the networks and many more (Jackson, 2018). The intruders who are using Social engineering uses certain techniques by which the true identity is not revealed. The main aim is mainly to influence, trick the users by making the privileged over certain things and then gaining access easily. It is seen that social engineering mainly relies on six key principles. This is mainly as follows. The first key principle is Reciprocity. This is followed by consistency and commitment. The next one is the social proof which is again followed by the authority. The next one comes out to be as liking. The last principle is the Scarcity.

Defending Process:

This malware can be easily defended by making the users educated about the term of phishing and social engineering (Stewart & Dawson, 2018). There should be a proper deployment of solutions like anti-malware and anti-spam. There should be the inheritance of two-way security as this would block the intrusion properly.

References:

Jackson, R. A. (2018). PULLING STRINGS: High-level hackers are using social engineering tactics to manipulate employees into giving up vital information. Internal Auditor, 75(4), 34-39.

Sampat, H., Saharkar, M., Pandey, A., & Lopes, H. (2018). Detection of Phishing Website Using Machine Learning.

Stewart, J., & Dawson, M. (2018). How the modification of personality traits leaves one vulnerable to manipulation in social engineering. International Journal of Information Privacy, Security and Integrity, 3(3), 187-208.

Requiremements

1) Each response should be 150-180 words.It should be also be cited according to APA format and atleast have 2 references not old more than 5 years.

2) It will be sunmitted it into safe asssign so the match percentage should be less than 15%.It means absolutely no plagiarism.

3) Some points mentioned by my professor regarding APA format

a)Citations: First off you can not just use any website. It needs to be of academic quality not just some random website. Also when you cite a website you do not just copy the hyper link and paste it in. There is more to it than that. There are lots of cites to help you with this. One example is https://www.citationmachine.net/apa/cite-a-website

b) APA Format: Many of you are not even trying to do APA format. You guys are missing a lot of the elements. Here is a link that will help you with a sample paper: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

c) Plagiarism: Some of you are getting a really high percentage on this. If the school feels you are plagiarizing you can get in a lot of academic trouble. I saw one person theirs was 80%

d) Typos: It is your responsibility to make sure that spelling and punctuation are correct. Some of you are not using comments and/or having some serious spelling errors. Once you post an assignment you need to verify that Blackboard did not mess it up and if did you may have to go back and MANUALLY fix it.

 

Image preview for need induvidual responses of two discussions of 150 words each for below posts.

Need induvidual responses of two discussions of 150 words each for below posts.

APA

434 words

Need induvidual responses of two discussions of 150 words each for below posts. was last modified: by