Discussion Post
The objective of this discussion is to understand how malicious software could violate the security of an information systems. Note that any software designed to infiltrate a target computer is know as a malicious software, and malicious software of different types are referred to as Malware.
Therefore, you are task to do the following:
Name two types of Malware and briefly describe their behaviors. As a security administrator in your organization, what are the processes you could use to detect and remove malicious software in a system?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.