Posted: February 18th, 2023
Malware Analysis & Mitigation (MSDF-631-M50)
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Currently, I work as a cybersecurity analyst at a local financial institution. My primary role is to ensure the security of the organization’s computer systems and networks. I have applied the skills and knowledge acquired from this course to conduct malware analysis, identify vulnerabilities, and deploy mitigation techniques to prevent cyber-attacks. Specifically, the following concepts from the course have been applied in my work:
Firstly, the course has enabled me to identify various types of malware, including viruses, Trojans, and worms. By analyzing the malware’s code, I can identify its behavior, including how it infects systems, how it propagates, and what damage it can cause. This knowledge has been beneficial in detecting and preventing malware attacks on the organization’s systems.
Secondly, the course has introduced me to various tools that can be used in malware analysis, including sandboxing, disassemblers, and debuggers. By utilizing these tools, I can analyze the malware’s behavior in a controlled environment without affecting the actual systems. This approach has been very useful in identifying the malware’s functionality and payload, which has aided in developing appropriate mitigation strategies.
Thirdly, the course has taught me various mitigation techniques that can be used to neutralize malware attacks. For instance, I have implemented techniques such as patch management, anti-malware software, and network segmentation. These techniques have been effective in preventing malware attacks and limiting their spread across the organization’s systems and networks.
Overall, the knowledge and skills acquired from this course have been instrumental in my current work environment. I can analyze malware, identify vulnerabilities, and deploy mitigation techniques to prevent cyber-attacks effectively. However, given t
Place an order in 3 easy steps. Takes less than 5 mins.