Body 10 Pages, APA, Double Space 1. Background Regarding the Malware a. General Description: When, where and how was the malware discovered b. Category of Malware: Virus, Worm, Trojan, etc. 2. Technical Detail Regarding the Malware a. National Vulnerability Database Information: Common Vulnerability and Exposure Listing, Common Attack Pattern Exploited, Aliases, Variants, etc. b. Technical Information: Vulnerabilities Exploited, Infection Mechanism, Applications, Operating Systems, Hardware Affected, Unique characteristics, etc. c. Payload Information: Trojan, Rootkit, Backdoor, Keylogger, etc. d. Propagation Mechanisms: Worm, Email, Botnet, Social Media, Supply Chain, etc. e. Obfuscation Techniques: Compression, encryption, polymorphism, anti-debugging, anti-disassembly f.General and specific detection techniques g. Remediation actions/procedures 10.0 pts Full Marks 0.0 pts No Marks 10.0 pts This criterion is linked to a Learning Outcome 3. Impacts of the Malware 3. Impacts of the Malware a. Describe the Political, Social and Economic effects b. Target of the attacks: Government, Users and Industry. c. Magnitude of attacks: Global, Nation State, Local d. Costs: Remediation, economic losses, etc. e. Action Taken: Political/Government, Legal proceedings, Charges, Prosecution 5.0 pts Full Marks 0.0 pts No Marks 5.0 pts This criterion is linked to a Learning Outcome Malware Cybersecurity Attack Lifecycle Analysis and Mitigation Techniques 4. Malware Cybersecurity Attack Lifecycle Analysis and Mitigation Techniques a. Reconnaissance: Detect Potential Attack b. Weaponization: Deny Attacker Information c. Delivery: Disrupt Attackers Attempts d. Exploit: Degrade Effectiveness or Deflect Attack e. Control: Deceive Attacker Execute: Destroy Attackers Capability to Execute g. Maintain: Recover from Attack Please use references: 1. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4433115/ 2. https://blog.trendmicro.com/trendlabs-security-intelligence/conficker-downad-9-years-examining-impact-legacy-systems/ ** Not limited to just these two. Please include in paper. Separate page: Outline, Reference page

Sample Solution

This question has been answered.

Get Answer