Outline a 2- to 3-page playbook in which a malware attack of your choice occurs. Complete the following in your outline: Provide details of the malware. Identify the exploited vulnerability and its attack vector. Analyze the vulnerability to determine 2 risks of this malware. Outline step-by-step instructions on how to resolve the malware attack. Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines. Note: You will use content from your Week 2 assignment as part of the Signature Assignment you will submit in Week 3 Cite at least 2 resources to support your assignment.

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs. Complete the following in your outline: Provide details of the malware. Identify the exploited vulnerability and its attack vector. Analyze the vulnerability to determine 2 risks of this malware. Outline step-by-step instructions on how to resolve the malware attack. Remember, numbered or bulleted steps or guidelines make the document easy for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps and guidelines. Note: You will use content from your Week 2 assignment as part of the Signature Assignment you will submit in Week 3 Cite at least 2 resources to support your assignment.

  1. Standing Operating Procedures – Trojan Horse

    Malware’s Details

  2. Trojan horse is a deceptive code that misleads users of its actual intent.
  3. The malicious code typically appears to come from a trusted source.
  4. Its initial presence as a legitimate software was a strategic way of gaining access to the target system.
  5. The software ultimately seeks to take control of the computer, and the first version of its kind was established in 1975.
  6. It is usually designed to steal, disrupt, damage, or initiate other harmful actions on the network, system, or data (Easttom, 2019). Our assignment writing help is at affordable prices to students of all academic levels and disciplines.

Exploited Vulnerability and its Attack Vector

  • References

    Easttom, C. (2019). Computer security fundamentals. Pearson IT Certification.

    Yu, W., Yalin, Y., & Haodan, R. (2019, October). Research on the Technology of Trojan Horse

    Detection. In 2019 12th International Conference on Intelligent Computation Technology and Automation (ICICTA) (pp. 117-119). IEEE.

    Resolving the Malware Attack

  • Trojan horse attack can be resolved by:
    • Run an internet security suite – Periodic diagnostic scans are sure ways of validating whether the system is under attack.
    • Identify and remove the program – There are many varieties of Trojan horses, and thus, recognizing the specific type makes it easy for its removal. One should further ensure all foreign extensions are removed from the computer (Easttom, 2019).
    • Update the operating system software – The attackers take advantage of worn-out applications to attack a computer. Outdated programs have many loopholes, which opens the way for further attack and thus should be checked and updated as soon as new versions are released.
    • Install antimalware software – Competitive solutions such as Kaspersky help catch up with the attacks before they manifest further.
    • Restart the system – Having removed all the present attacks and installed necessary protective strategies, it is imperative to restart the system for optimal performance.
  • Risks of the Malware

  • There lies a wide range of vulnerabilities that can expose the company to Trojan attacks, as listed below:
    • Tampered operating systems
    • Tampered webpages
    • Tampered browsers
    • Lack of user education
  • A Trojan horse has immense side effects, most of which affect the daily operations of the firm.
  • The vulnerabilities mentioned above pave the way for various risks, such as:
    • Data manipulation– The malware can delete users’ data, especially for backdoor Trojan horses. Backdoor Trojan horse is a malicious attack that hands over the system’s control to the remote attacker (Yu, Yalin & Haodan, 2019). This implies that the intruder can potentially perpetrate any desired action, including deleting files, launching, sending, and receiving data. Backdoor intrusion is typically applied to converge a group of systems to form a zombie network. The botnet can then be used to accomplish other criminal events.
    • Disruption of computers and networks – Apart from the data, the Trojan horse further affects the actual systems and connections. This attack is primarily accelerated by the rootkit Trojan horse, which seeks to conceal specific aspects of the system (Yu et al., 2019). This approach ensures that the malicious software is not detected; hence continues to exploit the infrastructure. The infected computers and networks are finally rendered ineffective and might have to be replaced.
  •  
  • In most instances, it can progressively run without users’ consent.
  • Every system is at the risk of acquiring Trojan malware – However, the less protected computers are the most vulnerable due to the low defensive mechanism.
  • The cyber attackers achieve their mission through social engineering whereby one is incited to load an attractive program into their computers.
  • It is perpetuated through various means such as a misleading email – One may receive an email masquerading to be from a trusted source. The moment the attachment is clicked, downloaded, and opened, the malware installs automatically.
  • Unlike the virus, this malware cannot replicate on its own – Its progression relies on real-time execution by the user.
Order a similar paper

Get the results you need