2022
DOI: 10.54692/ijeci.2022.0604121
|View full text |Cite
|
Sign up to set email alerts
|

The Cyber Security Incident Response and Reverse Engineering

Abstract: Although incident response has always been a crucial component of information security, security administrators frequently ignore it. Whereas, Reverse engineering focuses on the difficult issue of analyzing legacy software code in the absence of appropriate documentation. This paper proposes an approach to understanding cyber security Incident Response and the services it provides followed by Reverse Engineering resources and the practical analysis of a malware named “Alice ATM Malware” in detail.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
(12 reference statements)
0
1
0
Order By: Relevance
“…The future of network security practices holds immense potential for leveraging ML techniques to enhance threat detection, incident response, and risk mitigation strategies (Hassan, and Ibrahim, 2023). By embracing emerging trends in ML, exploring new research avenues, and implementing proactive strategies to address current challenges and limitations, organizations can strengthen their defense mechanisms, adapt to evolving cyber threats, and safeguard network infrastructure against sophisticated attack s (Safitra ,2023 ).…”
Section: Future Directions and Research Opportunitiesmentioning
confidence: 99%
“…The future of network security practices holds immense potential for leveraging ML techniques to enhance threat detection, incident response, and risk mitigation strategies (Hassan, and Ibrahim, 2023). By embracing emerging trends in ML, exploring new research avenues, and implementing proactive strategies to address current challenges and limitations, organizations can strengthen their defense mechanisms, adapt to evolving cyber threats, and safeguard network infrastructure against sophisticated attack s (Safitra ,2023 ).…”
Section: Future Directions and Research Opportunitiesmentioning
confidence: 99%