This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Fileless malware and security policy conformance

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Fileless malware and security policy conformance

Fileless malware is one of the most critical issues in the face of increased technological innovation and inventions. In this kind of attack, the initial vector of the bout may be in the form of an email with some added links. This kind of added component may come along with a JavaScript who aim is to open the door to a great threat. In this regard, it should be noted that the script may end up staying fully fileless as it operates behind the scenes and thus making some sort of commands to the machine of the user. In the worst-case scenario, this fileless malware may use the user’s credentials to seek out other access points.

However, there are various issues that are associated with fileless malware. One of these issues is identifying as well as analyzing the concealed and obfuscated code. The fileless malware portrays itself in such a way that it uses various techniques that can be used to conceal and obfuscate the malware, thus causing the detection tools to label the code in an incorrect manner or at times even fail to analyze the traffic in the first place (Meeuwisse, 2018).

The other issue that is associated with the fileless malware is detecting a broad spectrum of the fileless attacks that have no impact on the network and the performance of the host. The fileless attacks are usually hidden within the transactions that are web-based and those that are up and running within a network. To isolate them from a benign of activities, all the web traffic that uses the scripts have to be analyzed. This poses a great challenge especially when there are multiple transactions in tens, hundreds or thousands. The challenge of scrutinizing several transactions will definitely become a so much resource consuming aspect on the side of the user.

 

Conversely, there are various issues with security policy conformance. One of the critical issues, in this case, is implementing a security awareness program. In this case, the stakeholders should focus on educating the employees. This program should focus on the importance of security compliance and the impact of the lack of this to the organization. Some of the components of the security awareness program is the existence of the policy, where to find it, and how to comply with it.

The other major issue in regard to security policy compliance is communication. The various stakeholders should ensure that they effectively communicate the policy. After the security policy has been established, there is a need for it to be communicated in a formal way. In this regard, communication can take the form of ensuring that a copy of the policy is available to all the users. The policy can also be introduced during new orientation, as well as it being incorporated in the firm’s employee’s handbook. With effective communication in place in such a manner that all the employees are aware of what is on the ground and what is expected of them, there will be increased chances of compliance.

Monitoring is the other important issue in security policy compliance. The aim of conducting this practice is so as to ensure that corrective actions are taken in case of deviance. In order to enhance effectiveness in compliance, the organization in subject should ensure that it puts in place a plan that will ensure that there is periodic monitoring (Khan, 2009). The importance of monitoring is that it can facilitate reviews and modifications where necessary.

Last but not least, the other most important issue in security policy compliance is the need to update the security systems. In this case, there is a need to ensure that the policy is in line with the current trend. Failure to do this may lead to non-compliance as the application of the old policies that are not up to date may push the organization in subject to liability. Therefore, it is important to ensure that the security policies in place are current.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Khan, K. M. (2009). Managing Web service quality: Measuring outcomes and

effectiveness. Hershey, PA: Information Science Reference.

Meeuwisse, R. A. E. F. (2018). Cybersecurity to English dictionary: 4th edition. Place

of publication not identified: CYBER SIMPLICITY LTD.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask