9.2 - Combat Malware
9.2 - Combat malware
Key Terms:
- Heuristic algorithm – Algorithms that generate fairly accurate results in a short amount of time by focusing on speed instead of accuracy and completeness.
Malware Detection
Using anti-malware software is another line of defence against malicious programs. These programs use a variety of detection methods to identify malware on a system.
- Scanning – When a virus is detected, the anti-malware developer identifies its unique characteristics. Then a scanning process is written to look for those signatures on a system. The anti-malware program identifies the virus if found and eliminates it from the system.
- Integrity checker – An anti-malware program may look for changes in the system’s files and behaviours. This will alert the user that they may have malware on their system. The drawback to this is that they may receive false flags as a result.
- Interceptors – An interceptor defends against malware making network requests. It would alert the user if a request has been made that it deems suspicious.
- Code emulation – A code emulator is when an anti-malware program opens a virtual environment to run malware and monitor its activity.
- Heuristic analysis – Heuristic analysis is when malicious code signatures are compared to other suspicious files in hopes of identifying similarities.
Malware Penetration Test
There are 12 steps in a malware penetration test:
- Scan for open ports
- Scan for running processes
- Check registry entries
- Verify running Windows services
- Check startup programs
- Check the Event Log
- Verify installed programs
- Scan files and folders
- Verify device drivers
- Check network and DNS settings/activity
- Scan for suspicious API calls
- Run anti-malware scans
Malware Removal
If malware is detected on a system, the user should immediately isolate the computer from the network. This will help to eliminate possible spreading routes. Then they should update anti-malware software and complete a scan. Then, they should sanitise the system using their anti-malware software.
Comments
Post a Comment