Answer the following questions. 200 word minimum per question. 3 Reference minimum per question. Format reference list and in text citation in APA format.
1. What are two items to consider when creating a malware analysis environment?
Could malware detect and react differently if a potential malware analysis tool/environment is detected? Give three possible examples.
2. Give an example of an incident where it was discovered that a (Remote Access Trojan) RAT was found in a corporate network.
Identify one or more methods a forensic investigator may use to identify a potential RAT program?