mcy640 discussion 6

docx

School

Northern Kentucky University *

*We aren’t endorsed by this school

Course

484

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

1

Uploaded by fawb1

Report
1. In the assigned article, there are multiple significant file-based malware analysis challenges. Almost every organization is challenged by staffing requirements for malware analysis. This includes finding, training, and retaining experienced malware analysis talent. With that challenge, there also exists burnout causing employees to leave the workforce. This has led to 66% oof organizations turning to managed security service providers and venders to help shoulder the burden. 74% of organizations are training their existing employees to acquire malware analysis expertise. Another challenge presented would be organizations with malware analysis capabilities lack automation and tools not integrated. Along with this lacking toolset, 45% of organizations lack expertise in using tools. The skill gap becomes even more pervasive with malware analysis due to understaffed organizations. There simply aren’t enough employees with such talents to conduct malware analysis. Currently, 94% of organizations with malware analysis capabilities face challenges finding experienced malware analysts. U.S. department of Labor Statistics states 4.5 million workers quit jobs in November 2021. This has led to 89% of IT security organizations struggling to find staff. 2. One challenge I will discuss will be the human element in malware analysis challenges. As discussed above, unlike machines, humans can burnout on their position. This can be for multiple reasons, one being too much work, and not enough staff. Causing workers to be overworked and enough organizations willing to offer better pay, organizations cannot keep the staff they have. It has also proven difficult to get experienced IT workers. My opinion would be that humans have not advanced as quickly as technology has. Tech field is a new field with not a lot of professionals. This shows a demand for training new and existing employees to be able to work in the malware analysis field. 3. In my opinion, I believe this issue can be addressed and fixed. This will take dedication from organizations towards their employees. The organization will need to train existing employees to do the job. Considering tech involves a considerable amount of education, the incentive to accept this position must be fitting to the difficulty of the work. Another method organizations can adopt regarding staffing would be to give sign-on bonuses. As said before, humans need incentive to take on difficult tasks. This incentive being monetarily. The last method that can be used would be using third party service providers to take on malware analysis duties. This may be the most plausible method due to handing responsibility over to another organization that specializes in malware analysis. Of course, this comes with an issue, contracting a third party organization could be very expensive. It would be important to your organization to record pros, cons, and cost benefits.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Write a balanced equation for the reaction of solutions of lead (IV) nitrate with sodium sulfate to…
Q: The accompanying data table lists measures of self-esteem from a student project. The objective of…
Q: Provide an explanation for the occurrence of the afterimage based on events occurring in the cone…
Q: For the series -2 + 3 + (-9/2) + 27/4 + …, S14 =
Q: Imagine a meter stick set up as in the figure (in the video above). It hangs from a central bracket,…
Q: d. Because Streaming and Cable TV are close (Complements/Substitutes), the Demand for Streaming is…
Q: Will you change your behavior? Why or why not? If yes, in what ways?
Q: If a municipality files for bankruptcy, how does this happen, and what is the sequence of events…
Q: V Find the greatest common factor of 10c and 0 8 X
Q: Which internal control procedure is a deterrent to corruption? Multiple Choice O O Use of…
Q: 8-85. A 180-lb farmer tries to restrain the cow from escaping by wrapping the rope two turns around…
Q: 1.Consider the function f(x)=7−8x2 on the interval [−3,6].(A) Find the average or mean slope of the…
Q: (a) Give the five-number summary for the distribution, and (b) draw a box-and-whisker plot. 8, 20,…
Q: What is the common name for all three??
Q: Scores on a dental anxiety scale range from 0 (no anxiety) to 20 (extreme anxiety). The scores are…
Q: Briefly explain what is measured by the standard error of estimate
Q: m) ¹H NMR signals: ¹H NMR signals: ¹H NMR signals: p) ΝΗ ¹H NMR signals:
Q: A single loop of steel wire, lying flat in a plane, has an area of 7.80 cm² and a resistance of 1.80…
Q: Consider the following information for stocks A, B, and C. The returns on the three stocks are…
Q: The tickle response can also trigger escape movements, increased heart rate and tears. What type of…
Q: Using Python write a string-comparison function named strNcompare that compares up to n characters…
Q: Kevin wants a new paddle​ board, and will buy a package consisting of a​ board, custom​ fin, and…