Reference Hub2
Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks

Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks

ISBN13: 9781668486665|ISBN10: 1668486660|ISBN13 Softcover: 9781668486672|EISBN13: 9781668486689
DOI: 10.4018/978-1-6684-8666-5.ch013
Cite Chapter Cite Chapter

MLA

Babu, C. V. Suresh, et al. "Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks." Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., IGI Global, 2023, pp. 285-312. https://doi.org/10.4018/978-1-6684-8666-5.ch013

APA

Babu, C. V., Suruthi, G., & Indhumathi, C. (2023). Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks. In S. Shiva Darshan, M. Manoj Kumar, B. Prashanth, & Y. Vishnu Srinivasa Murthy (Eds.), Malware Analysis and Intrusion Detection in Cyber-Physical Systems (pp. 285-312). IGI Global. https://doi.org/10.4018/978-1-6684-8666-5.ch013

Chicago

Babu, C. V. Suresh, G. Suruthi, and C. Indhumathi. "Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks." In Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., 285-312. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8666-5.ch013

Export Reference

Mendeley
Favorite

Abstract

Malware continues to plague all organizations causing data loss and reputational damage. Malware forensics helps protect companies from such attacks. The data is going to be organized in a manner that covers the multiple malware attacks, the methods for detecting them, and then makes a suggestion for a tool that is comparable but also equivalent to reach the attacker. Considering that the concept signifies that malware forensics will be performed using a variety of tools and techniques, a procedure will be followed in order to get the desired outcome. This chapter discusses these issues in detail with an intensive literature review and feasible recommendations and suggestions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.