Installing a Malicious Executable

Topic 1: Installing a Malicious Executable
In the lab, you will see that a malicious actor managed to install a malicious executable on the system. Using your knowledge from prior classes, Internet research, and the course references, discuss one possible technique a malicious actor could have used to install the executable other than the one shown in the lab.
Note: I will provide what technique was used in the lab as soon as I do this mentioned lab.
Here is my E-book: Sheward, M. (2018). Hands-on incident response and digital forensics. BCS.
Here is some extra references:
Hands-on Incident Response and Digital Forensics, by Mike Sheward, in the Library. You can access the text through the Library portal.
Chapter 3: “The Incident Response Process”
In NIST Special Publication 800-83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops, read the following:
Chapter 4, Section 2: “Detection and Analysis”
National Institutes of Standards and Technology (NIST). https://www.nist.gov/
Thank you in advance.

Last Completed Projects

topic title academic level Writer delivered