Chat with us, powered by LiveChat

24/7 Support

+1-559-742-0021

info@assignments4u.com

Assignment Help

CYB 320- Malware and Cryptography

Aug 25, 2023

Assessment Description

System protection requires multiple layers of safeguards. Therefore, a security professional must understand how to identify, remove, and prevent threats. Research notable malware attacks from the past 10 years. These can be from viruses, ransomware, or any other method you have learned about in Topic 1. In 500-750 words, address the following:

  1. What is the purpose of malware?
  2. Of the different types of malware, which do you think is most destructive to an organization? Justify your rationale by using the research you conducted on notable malware attacks.
  3. What is cryptography? What are the different types of cryptography and what are they used for in an organization?
  4. What happens when cryptography and malware are combined?
  5. Malware signature, such as antivirus, is a simple and fast detection mechanism that can complement more sophisticated analysis strategies. However, if signatures are not designed with care, they can turn from a defensive mechanism into an instrument of attack. You are a security professional who designed the malware signature and just discovered some flaws in the software. Explain how you can make your decision to adhere to the code of conduct of your organization and elaborate your explanation from the Christian worldview.
  6. How can 2 security professionals evaluate and remove a threat using malware analysis and cryptographic techniques? From the research you conducted on notable malware attacks, provide two to three specific examples of how this could be accomplished. Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required. This assignment uses a rubric. Please review the rubric before beginning the assignment to become familiar with the expectations for successful completion.

Malware and Cryptography

In recent days, every member of society is using the internet for their daily needs. Nearly it is impossible to do anything without the Internet today that’s why every person is using the Internet for daily use. Since the use of the internet is growing rapidly and hence cybercrime is also increasing rapidly.

  1. Malware

Normally criminals use malicious software in the fields of cyber-attacks to steal someone’s information or to disrupt someone’s or any organization’s data. Any software that is intentionally used to hamper someone or any organization’s data can be termed malware (Aslan & Samet, 2020, p.6250).

  1. Most Dangerous Ransomware

Club ransomware is one of the most dangerous and recent ransomware threats that is emerging rapidly. It is a part of the old notorious CryptoMix ransomware which used to hit window users. Apart from the damages, Clop ransomware is capable of blocking more than 600 Windows users and can have the capability of disabling multiple Windows 10 application software which includes Windows DefenderSecurity Essentialsreacheseureka and Microsoft security essentials which are known to securely protect the data.

Since its establishment, Clop has improvised itself to target organizations rather than damaging only individual devices. That is why it is considered one of the most malicious threats to any organization. Many organizations have faced problems with Clop and are forced to make ransom payments (www.cybertalk.net, 2022).

  1. Cryptography

Cryptography can be defined as the skill of writing or solving codes according to the Concise Oxford English Dictionary (Katz & Lindell, 2020, p.8). Cryptography is the process or method of protecting data and communications through the implementation of codes so that the data should reach its desired location or the person who wants it. In computer science, cryptography is known to secure data and information through algorithms (edureka.co, 2022).

Types of Cryptography

  • Symmetric key cryptography

In this type of encryption system, a special key or common key is used to encrypt and decrypt the messages.

  • Hash functions

Like symmetry key cryptography no specific key is used. A hash value with a fixed length is used in the process of encryption and decryption.

  • Asymmetric key cryptography

It works more like a symmetry key because here also the usage of keys is important. In this system, a pair of keys is used for the encryption and decryption of information.

  1. Combination of Malware and Cryptography

When malware and cryptography are combined Ransomware is produced. This is a very dangerous mix because it is equally effective as malware. Ransomware is a part of the study of crypto virology. Ransomware generally uses techniques like phishing mail or spammed messages where clicking on the link can cause the device to be infected by malware.

  1. Signature Based Anti-Virus

Signature-based detection is one of the most important processes of any malware detection system. The procedure looks for certain patterns of viruses in signature-based large databases. Some antiviruses rely highly on these signature procedures. As the working of the signature-based antivirus involves creating certain appropriate signatures for each file after scanning, weak signature-based antiviruses are very luring to viruses. Viruses attack antivirus and disrupt those signatures creating chaos and confusion. This way they attack the anti-virus software and result in the details of any organization.

  1. Malware Removal

There is no special procedure done by security professionals to remove malware because more or less damage caused by malware is the same type of damage faced by any other in their devices. At first, they make sure that their systems or files are truly affected or not. Gradually they find the file from where the malware started affecting, the file or email, or the source where the malware came or became active. After doing so they delete the source file or source program. At last, they scan the whole device or the whole system or completely delete the files and folders of the software that are affected by the malware to prevent the effects of malware.

References

Aslan, Ö. A., & Samet, R. (2020). A comprehensive review of malware detection approaches. IEEE Access8, 6249-6271.

www.cybertalk.net (2022) 10 of the most dangerous malware threats retrieved from https://www.cybertalk.net/2022/02/15/10-of-the-most-dangerous-malware-threats/ [Retrieved on 2nd September 2022]

edureka. co (2022) What is Cryptography? – An Introduction to Cryptographic Algorithms retrieved from https://www.edureka.co/blog/what-is-cryptography/ [Retrieved on 2nd September 2022]

Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography. CRC press.

Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

=