This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
War

an emerging threat Fileless malware: a survey and research challenges

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

an emerging threat Fileless malware: a survey and research challenges

The article examined was written by Sushil Kumar Sudhakar and was titled ‘an emerging threat Fileless malware: a survey and research challenges.‘ The author examines how cybersecurity threats have evolved over time with the evolution of countermeasures. The new threat that cybersecurity faces is fileless malware. The unique thing about fileless malware is the lack of executables which foster to carry-out the activities of the threats, and it does not utilize file system (Sudhakar, 2020). Due to the lack of file systems, contemporary detection systems that are signature-based are hence ineffective. A fileless malware attack is catastrophic to any computer system due to its ability to evade any anti-virus protection implemented. Security practitioners hence have to utilize forensic tools in the fight against fileless malware. Example of detection techniques against fileless malware include detection that is rule-based, detection that monitors a system’s behavior, and detection through a process of learning the behavior of attack.

A security practitioner is an individual that is involved in the provision of security information and mitigation and prevention countermeasures against any threats (Dehghantanha et al., 2018). A security practitioner may be a Network Security Engineer, a Cybersecurity Specialist, Or an Information Technology Security Manager. The knowledge of how security threats have evolved over time may be valuable for any security practitioner. There is a need to understand what threats exist and how one may combat such threats. For example, fileless malware cannot be detected and dealt with through the utilization of traditional security measures, such as, anti-viruses. If a security practitioner is up-to date with the latest threats, then they will be in a position to suggest the best countermeasures for any organization (Saxena, 2018). In addition, comprehension of the various detection mechanisms as explained by Sushil Kumar Sudhakar in his article may serve as a knowledge-base against future attackers on any system.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask