What threats might this pose to your work computer should you just plug the memory stick in and examine its content? In particular, consider whether each of the malware propagation mechanisms we discuss could use such a memory stick for transport. What steps could you take to mitigate these threats, and safely determine the contents of the memory stick? Support your answers by surveying various malware and how they affect systems and users.
Your well-written paper should meet the following requirements:
Paper length: 3 pages
Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.
Must include introduction and conclusion.