About this Assignment
Dealing with malware has become a daily task in the world of computing today. This kind of software code can take on many forms such as e-mail attachments, downloads, pop-ups and key loggers. Hackers can use these methods to impact productivity, make money, steal critical information and crash systems. For this final assignment, you will write a 1,500-2,000 word report outlining how a hacker could gain access to systems using the various types of malware available. Your report should also include an outline of how to remediate malware attacks and set forth a plan on how future attacks can be prevented.
Scenario
Greentown College, where you were just hired as the new head of IT, has been infected by a severe malware outbreak. The president has called you in and is demanding to know how this happened, what you are doing to fix it, and how you will prevent this in the future. While you are embarrassed that this happened, it does not impact your resolve. After conducting a comprehensive analysis of the security processes and technology in place, you find that they are woefully insufficient. You have found various worms, viruses, malware, spyware and even a case of ransomware that cost a student their next semester’s tuition. Based on this information, write a 1,500-2,000 word report to the president of the college and the board of trustees outlining the types of malware used and the methods hackers implemented to gain access. Include in your report how you are going to remediate these breaches, and what processes and tools will be immediately implemented to ensure that malware infection risk is mitigated.
Formatting & Sources
Please write your paper in the MLA format. You may refer to the course material for supporting evidence, but you must also use 3 other sources and cite them using the MLA format. Please include a mix of both primary and secondary sources, with at least one source from a security journal. If you use any Study.com lessons as sources, please also cite them in MLA (including the lesson title and instructor’s name).
Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
Secondary sources come from bodies such as the National Institute of Standards and Technology (NIST). You may use sources like JSTOR or Google Scholar to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)
If you’re unsure about how to use the MLA format to cite your sources, please see the following lessons:
What is MLA Format?
How To Format MLA Citations