Difference between revisions of "Sophisticated Malware"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' Sophisticated [[Malware|malware]] attacks have been customized and are specifically deployed at certain targets, rendering security solutions ineffective. They are very difficult to detect and they put a strain on an organization’s ability to manage the attack, whose security controls usually can effectively handle the less sophisticated [[Malware|malware]] attacks.
+
| '''1.''' Sophisticated malware attacks refers to the deployment of customised malware onto specific target organisations, rendering their security solutions ineffective.  
 +
'''Notes (1):''' They are very difficult to detect and they put a strain on an organization’s ability to manage the attack, whose security controls usually can effectively handle the less sophisticated malware attacks.
 +
'''Related Term''': [[Malware|Malware]]  
 +
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/>
 +
{{Template:BLCoursesBanner}}
 
{{Bcm Institute Source}}
 
{{Bcm Institute Source}}
 
 
|}
 
|}
 
+
&nbsp;
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
{{Template: BookMGBCMResponse}}
 
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
 
 
 
'''2.''' Sophisticated malware attacks are best defined as those situations involving anti-virus and other security solutions that are rendered ineffective due to custom written, and often specially purposed malware deployed by threat actors. Sophisticated malware incidents typically take longer to detect, and tend to challenge the most mature organizations whose security controls effectively handle the simpler and well-known malware attacks. As can be expected, sophisticated malware tends to occur more commonly with targeted attacks. While sophisticated malware is found in a smaller percentage of the breaches in our entire data set, it is present in a significant portion of our investigations. Because of this, we consider sophisticated malware as a lethal data breach scenario.<br/> '''Source:''' (Verizon, 2016)<br/> <br/> '''3.''' With the efforts made to enhance security through segregation and defense-in-depth principles, threat actor activities have become increasingly complex. Enter sophisticated malware. In some operations, threat actors increase their sophistication through malware to achieve their goals.<br/> '''Source:''' (Verizon, 2017)
 
'''2.''' Sophisticated malware attacks are best defined as those situations involving anti-virus and other security solutions that are rendered ineffective due to custom written, and often specially purposed malware deployed by threat actors. Sophisticated malware incidents typically take longer to detect, and tend to challenge the most mature organizations whose security controls effectively handle the simpler and well-known malware attacks. As can be expected, sophisticated malware tends to occur more commonly with targeted attacks. While sophisticated malware is found in a smaller percentage of the breaches in our entire data set, it is present in a significant portion of our investigations. Because of this, we consider sophisticated malware as a lethal data breach scenario.<br/> '''Source:''' (Verizon, 2016)<br/> <br/> '''3.''' With the efforts made to enhance security through segregation and defense-in-depth principles, threat actor activities have become increasingly complex. Enter sophisticated malware. In some operations, threat actors increase their sophistication through malware to achieve their goals.<br/> '''Source:''' (Verizon, 2017)
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 03:38, 3 November 2020

1. Sophisticated malware attacks refers to the deployment of customised malware onto specific target organisations, rendering their security solutions ineffective.

Notes (1): They are very difficult to detect and they put a strain on an organization’s ability to manage the attack, whose security controls usually can effectively handle the less sophisticated malware attacks. Related Term: Malware







(Source: Business Continuity Management Institute - BCM Institute)

 

2. Sophisticated malware attacks are best defined as those situations involving anti-virus and other security solutions that are rendered ineffective due to custom written, and often specially purposed malware deployed by threat actors. Sophisticated malware incidents typically take longer to detect, and tend to challenge the most mature organizations whose security controls effectively handle the simpler and well-known malware attacks. As can be expected, sophisticated malware tends to occur more commonly with targeted attacks. While sophisticated malware is found in a smaller percentage of the breaches in our entire data set, it is present in a significant portion of our investigations. Because of this, we consider sophisticated malware as a lethal data breach scenario.
Source: (Verizon, 2016)

3. With the efforts made to enhance security through segregation and defense-in-depth principles, threat actor activities have become increasingly complex. Enter sophisticated malware. In some operations, threat actors increase their sophistication through malware to achieve their goals.
Source: (Verizon, 2017)