Emerging Threats and Countermeasures
In this paper, please research the topic of Response. Please demonstrate a command of the material under investigation and a subject matter expertise in the topic that you choose to write about. You are expected to demonstrate graduate-level writing, critical thinking, critical assessment, critical writing, and advanced research skills.
You are expected to use at least three (3) outside primary source materials in addition to evidence obtained from the course materials from textbook(attached Material)
Note – Please be sure to use complete sentences. Please be sure to demonstrate that you read and understood the material for this module by offering detailed explanations, critical assessments, and analyses of the material that is grounded in cited evidence from the readings, peer reviewed journals, and (whenever possible) real-world examples
Your paper should meet the following requirements:
- The paper should be 4-6 pages double spaced, 12 point times new roman font with 1 inch margins. Title page, restating the instructions, table of contents, and references do not count towards the page count.
- Provide Plagiarism free content. You should follow APA citation rules. (https://owl.english.purdue.
edu/owl/resource/560/01… (Links to an external site.)). - Please be sure to proofread, spell check, and grammar check your paper prior to submission.
Answer preview
Malware is another security threat that is affecting organizations today. Malware refers to malicious software that damages systems and data as it gains access to networks. Malware is delivered as links through emails or files such that when users click the links, the file is executed, and the malware takes control of the computer. The files that attackers gain from using malware are used to demand ransom, especially is the data in their possession is sensitive. Even though malware has existed since the 1970s, it has evolved to match technological changes and security upgrades. According to Jang-Jaccard & Nepal (2014), malware evolves to exploit new flaws in emerging technologies and avoid detection. Some examples of malware are viruses’ worms, spyware, trojan, and ransomware, among other malicious software. All these malware operate uniquely, but they are all dependent on user actions. The common ways of propagating malware are emails, executable files, social media, and instant messaging.
[1401 Words]