part 1
Part ONE
Imagine that an organization has been recently experiencing rootkits attacks from various external sources. The chief information security officer (CISO) of the corporation has tasked you, the chief cybersecurity officer, to provide a vivid analysis of rootkits.
For this assignment, you must write a paper that includes the following items:
A brief description of rootkits.
A complete description of user-mode rootkits, kernel mode rootkits, and Master Boot Record (MBR) rootkits.
Information about how to identify and fight rootkits attacks in the organization.
A recommendation for a rootkit removal solution.
Complete and include the table below.
Tool to remove RootkitManufacturer/vendorBrief Description of usePanda Anti-Rootkit McAfee Rootkit Detective F-Secure Blacklight Rootkit Eliminator IceSword Anti-Rootkit Rootkit UnHooker
Keep your audience in mind. Remember you are not preparing this paper for an academic audience, you are preparing it for the CISO. The CISO will not care about theoretical or conceptual issues in information security. CISOs will only care about specific issues, strategies, and scenarios relevant to their organization.
Length: 2-3 pages, not including titles and reference pages.
References: Support your paper with a minimum of 3 scholarly resources
Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.
Solution Preview
Rootkits Attacks Analysis
A brief description of rootkits
A rootkit is a software program that is designed to a user with an administrator access to a database or computer without detection. As such, rootkits are considered to be among the most dangerous malware attacks as since cybercriminals use them to illegal access remote systems and, in turn, undertake malicious operations, such as stealing critical and confidential data.
(714 words)