9.2 - Combat Malware

 9.2 - Combat malware 

 

Key Terms: 

  • Heuristic algorithm – Algorithms that generate fairly accurate results in a short amount of time by focusing on speed instead of accuracy and completeness. 

 

Malware Detection 

Using anti-malware software is another line of defence against malicious programs. These programs use a variety of detection methods to identify malware on a system. 

    • Scanning – When a virus is detected, the anti-malware developer identifies its unique characteristics. Then a scanning process is written to look for those signatures on a system. The anti-malware program identifies the virus if found and eliminates it from the system. 
    • Integrity checker – An anti-malware program may look for changes in the system’s files and behaviours. This will alert the user that they may have malware on their system. The drawback to this is that they may receive false flags as a result. 
    • Interceptors – An interceptor defends against malware making network requests. It would alert the user if a request has been made that it deems suspicious. 
    • Code emulation – A code emulator is when an anti-malware program opens a virtual environment to run malware and monitor its activity. 
    • Heuristic analysis – Heuristic analysis is when malicious code signatures are compared to other suspicious files in hopes of identifying similarities. 

 

Malware Penetration Test 

There are 12 steps in a malware penetration test: 

  1. Scan for open ports 
  2. Scan for running processes 
  3. Check registry entries 
  4. Verify running Windows services 
  5. Check startup programs 
  6. Check the Event Log 
  7. Verify installed programs 
  8. Scan files and folders 
  9. Verify device drivers 
  10. Check network and DNS settings/activity 
  11. Scan for suspicious API calls 
  12. Run anti-malware scans 

Malware Removal 

If malware is detected on a system, the user should immediately isolate the computer from the network. This will help to eliminate possible spreading routes. Then they should update anti-malware software and complete a scan. Then, they should sanitise the system using their anti-malware software. 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1