Even an organization most advance defenses such as antivirus, firewall and IPS are no match for the sophisticated attacks deployed today. Malware forensics investigation is the study or process of determining the functionality, origin and potential impact of a given malware sample such as a virus, worm, Trojan horse, rootkit, or backdoor. Malware focus to compromise the system, Confidentiality, Integrity and Availability. In the malware analysis the malware behavior can take place in various environments. This is categorized into: Static, Mounted, Live & Network.
It is hard to deny the booming popularity of social networking sites, the type of sites that facilitate a high degree of user personalization, and user intercommunication. There's a huge amount of information about users personal life's being posted every day. People frequently post information about the more mundane aspects of their lives that they would probably not share with someone during verbal conversation. Additionally, users may share their status, news stories, notes, photos, videos, and allow their friends or friends of friends to comment on them.
Cyber intruders are continuously refining their methods to outwit your security. Cyber threats against small medium enterprise & Multinational Corporation are continuing to grow more powerful and sophisticated. In order to effectively detect and investigate security incidents, such as advanced persistent threats, zero day attacks, malware and data leakage, organizations must employ forensic analysis. Detecting unknown threats and understanding the root cause of an incident is impossible without forensic visibility into all that is happening across enterprise.