“Please Read the Instructions Carefully in the body of this post and in the Project 3.docx and project4.docx files attached below.

Discussion-1 450  words (topic : Fileless malware ):

APA Format, need References

Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Fileless malware exists only in memory, not in files, which makes it challenging for traditional antivirus products to detect. As a result, fileless attacks are much more likely to succeed than file-based attacks.
Answer the following question(s):

What do you suggest as a countermeasure to prevent fileless malware infections? Your solution can be technical or non-technical.

Discussion-2 450  words (topic : Security Policy Conformance ):

APA Format, need References

An organization€™s security policy can be interpreted in a few ways. A strict security policy interpretation means that no security controls exist unless they are directed by the policy. A less strict interpretation allows IT security to exercise some discretion to implement best practices that may not be explicitly defined in the security policy.
Answer the following question(s):

In your opinion, does strict security policy interpretation provide better security than a less strict interpretation? Why or why not?

Two Assignments (  each one minimum 3 pages content):

APA Format, need References,  Font: Arial, size 12, double-space
Questions are attached below  (file names: Project 3.docx, Project 4.docx)