Answered You can hire a professional tutor to get the answer.
Please Read the Instructions Carefully in the body of this post and in the Project 3.docx and project4.docx files attached below.Discussion-1 450 words (topic : Fileless malware ): APA Format, need Re
Discussion-1 450 words (topic : Fileless malware ):
APA Format, need References
Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Fileless malware exists only in memory, not in files, which makes it challenging for traditional antivirus products to detect. As a result, fileless attacks are much more likely to succeed than file-based attacks.
Answer the following question(s):
What do you suggest as a countermeasure to prevent fileless malware infections? Your solution can be technical or non-technical.
Discussion-2 450 words (topic : Security Policy Conformance):
APA Format, need References
An organization’s security policy can be interpreted in a few ways. A strict security policy interpretation means that no security controls exist unless they are directed by the policy. A less strict interpretation allows IT security to exercise some discretion to implement best practices that may not be explicitly defined in the security policy.
Answer the following question(s):
In your opinion, does strict security policy interpretation provide better security than a less strict interpretation? Why or why not?
Two Assignments ( each one minimum 3 pages content):
APA Format, need References, Font: Arial, size 12, double-space
Questions are attached below (file names: Project 3.docx, Project 4.docx)