{"id":394,"date":"2023-11-12T21:09:46","date_gmt":"2023-11-12T21:09:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=394"},"modified":"2023-12-06T16:27:39","modified_gmt":"2023-12-06T16:27:39","slug":"describe-some-actions-or-techniques-that-can-be-used-to-mitigate-or-stop-the-impacts-of-malicious-applications-are-some-of-these-methods-more-effective-than-others-provide-an-example-of","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/12\/describe-some-actions-or-techniques-that-can-be-used-to-mitigate-or-stop-the-impacts-of-malicious-applications-are-some-of-these-methods-more-effective-than-others-provide-an-example-of\/","title":{"rendered":"Describe some actions or techniques that can be used to mitigate or stop the impacts of malicious applications.\u00a0 Are some of these methods more effective than others?\u00a0 Provide an example of a cyber attack that resulted from the execution of malicious code.\u00a0 There are plenty of examples that can be queried from the Internet."},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>There are many different ways a malware attack could be prevented. Such as filtering out packets you are not expecting just as if it were regular mail. By doing this you are not getting junk or putting the computer at risk. Another option that can be done is to block websites that you know are not safe. Looking for the s missing from the URL or a website ending in &#8220;.comm&#8221;. Being vigilant is always the best protection such as not clicking links sent without verifying the sender or verifying the URL.&nbsp;Another way to be safe is to keep daily backup logs in case the computer needs to be wiped to stop an attack.<\/p>\n\n\n\n<p>A real-time malicious code attack was the SolarWinds attack in 2020. In this case, attackers implanted malicious code into the update of the SolarWinds server. This resulted in many government facilities and agencies along with many private sectors becoming affected.<\/p>\n\n\n\n<p><strong>Resources:<\/strong><\/p>\n\n\n\n<p><em>Malicious code: Real life examples and 14 protective measures<\/em>. Aqua. (2023, July 18). https:\/\/www.aquasec.com\/cloud-native-academy\/vulnerability-management\/malicious-code\/<\/p>\n\n\n\n<p><em>Mitigating malware and ransomware attacks<\/em>. NCSC. (2020, February 13). https:\/\/www.ncsc.gov.uk\/guidance\/mitigating-malware-and-ransomware-attacks#actionstotake<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many different ways a malware attack could be prevented. Such as filtering out packets you are not expecting just as if it were regular mail. By doing this you are not getting junk or putting the computer at&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2023\/11\/12\/describe-some-actions-or-techniques-that-can-be-used-to-mitigate-or-stop-the-impacts-of-malicious-applications-are-some-of-these-methods-more-effective-than-others-provide-an-example-of\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/394"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":442,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/394\/revisions\/442"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}