Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Research online or using the Mitre Att@ck Matrix references. Select Two (2) Viruses, Attacks, or Vulnerability Incidents. Search for attack methods applicable to computers, IoT,
Research online or using the Mitre Att@ck Matrix references.
Select Two (2) Viruses, Attacks, or Vulnerability Incidents. Search for attack methods applicable to computers, IoT, portable devices. Based on the information provided, post in Canvas (a doc or PPT) the link and cite the article, use Mitre methodology to discuss the following:
- Describe the incident indicators leading towards the compromise?
- Based on the indicators of compromise, opine to determine the type of virus or malware used in the attack.
- Name and brief description of the attack method, what does it do?
- What type of attack method?
- Who created it?
- How is it triggered?
- According to Mitre Attack, where do we look for the forensic evidence sources?
- Describe how does it work?
- Under normal circumstances, describe how does the device work? Then describe, how does the attack method affect the device? In other words, what does normal look like? When the attack is executed, how does the normal device behavior change?
- How is the victim impacted? What damage did it cause?
- What was the risk (the consequence) to the company or victim?
- Why does it matter?
- What could/should be done to prevent the incident from happening again?
- How does knowing the information help the DFI?
Example Methods:
- Anonymizer (ad ware)
- Worms and Virus
- Trojan Horses and Back doors
- Steganography
- DOS and DDOS Attacks
- SQL Injection
- Buffer Overflow
- USB Attacks
- Wireless Network attacks
- Password Cracking
- Keyloggers and Spyware
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started