What are two items to consider when creating a malware analysis environment

computer science

Description

Question 1

Give an example of an incident where it was discovered that a RAT was found in a corporate network.   

Identify one method a forensic investigator may use to identify a potential RAT program?

Note: a minimum of 3 references APA format in text citation. Please do not make use of reference older

than 2013 and a minimum of 500 words


Question 2

In one of your readings for this week the authors describe “malicious code detection as an obfuscation-

deobfuscation game” -- why? 

Give two examples of how malware may try to hide itself on an asset.

Note: a minimum of 3 references APA format in text citation. Please do not make use of reference older

than 2013 and a minimum of 500 words


Question 3

What are two items to consider when creating a malware analysis environment?  

Could malware detect and react differently if a potential malware analysis tool/environment is detected?

 Give two possible examples.

Note: a minimum of 3 references APA format in text citation. Please do not make use of reference older

than 2013 and a minimum of 500 words


Related Questions in computer science category