What is the state of the art in addressing the problem


Assignment: Mitigating Advanced Attacks

Part ONE

Imagine that an organization has been recently experiencing rootkits attacks from various external sources. The chief information security officer (CISO) of the corporation has tasked you, the chief cybersecurity officer, to provide a vivid analysis of rootkits.

For this assignment, you must write a paper that includes the following items:

1. A brief description of rootkits.
2. A complete description of user-mode rootkits, kernel mode rootkits, and Master Boot Record (MBR) rootkits.
3. Information about how to identify and fight rootkits attacks in the organization.
4. A recommendation for a rootkit removal solution.
5. Complete and include the table below.

Tool to remove RootkitManufacturer/vendorBrief Description of usePanda Anti-Rootkit McAfee Rootkit Detective F-Secure Blacklight Rootkit Eliminator IceSword Anti-Rootkit Rootkit UnHooker

Keep your audience in mind. Remember you are not preparing this paper for an academic audience, you are preparing it for the CISO. The CISO will not care about theoretical or conceptual issues in information security. CISOs will only care about specific issues, strategies, and scenarios relevant to their organization.

Length: 2-3 pages, not including titles and reference pages.

References: Support your paper with a minimum of 3 scholarly resources

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Part TWO-

Develop a Research Problem Statement and Justification

For this task, select an issue or problem that is defined in recent scholarly literature and is related to users' perceptions of risk management in organizations. Write a paper in which you address the items below.

• What is the problem that should be addressed with additional research (i.e., what is going wrong)? Support the existence of the problem with recent scholarly references.

• What is the impact of the problem? That is, how are the victims (field of study, researchers, practitioners, industry, civilians, etc.) negatively affected by the problem, when is the problem evident, and where does the issue exist or become obvious? Provide an example of the problem in action or as experienced by those affected by it. Support the impact of the problem with recent scholarly or industry literature.

• Why does the problem exist? Discuss the conceptual basis, the nature of the problem, and outline of the problem as defined by the literature. Support the underlying cause of the problem with recent scholarly or industry literature.

• What is the state of the art in addressing the problem? Conduct a comprehensive review of the literature in which you explain what steps have been taken to solve this problem so far, and explain why the problem has not yet been solved to the satisfaction of either information systems researchers or industry practitioners.

Length: 4-6 pages, not including title and reference pages

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Rootkit.rar

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What is the state of the art in addressing the problem
Reference No:- TGS02997811

Now Priced at $45 (50% Discount)

Recommended (99%)

Rated (4.3/5)