Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture
Absztrakt :
In this article, the authors present a data-driven architecture-based malware exploit analysis as the next part of the Penetration Testing article series. The analysis contributes greatly to investigating malicious attacks, which are becoming increasingly sophisticated in cyberspace, thus posing a significant threat to the information and communication networks of state and non-state actors. To achieve their research objectives, the authors use analytical evaluation methods to define the principles, modular elements and procedures of the data-driven architecture to be applied, where decisions are made based on the available data. On this basis, they have presented an analytical process that can help the public and defence sectors to analyse this type of attack, thus facilitating recovery processes.