PART1. Using a web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s web site;this could be Symantec, McAfee, or any of their

competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between two vendors? Write 300 words. Include references.

PART 2. Using a Web search tool, identify cases in which private information was disclosed when computer equipment was discarded. Recent examples have included smartphones (like Black-Berry) that were sold without proper data cleansing and hard drives that were sold without data cleansing after the computers they were originally used in were upgraded. Write 300 words. Include references.

Provide documented evidence, of the chosen exercise above (i.e. provide answers to each of the stated questions). Detailed and significant answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided. Please follow APA format.

This is the text book to follow:(just a reference to help,Use online resources)

Michael E. Whitman, Herbert J. Mattord, Andrew Green. Principles of Incident Response and

Disaster Recovery (2014). Cengage Learning. ISBN: 978-1111138059

Sample Solution

This question has been answered.

Get Answer