Case Study 1
Written Application Focus: In the textbook, Defensive Security Handbook, use Table 1-1, Ransomware Use Case as your guide for this assignment. Outline the step-by-step kill chain use case for a phishing attack. Be sure to include all 4 categories (Kill chain step, Malicious action, Defensive mitigation and potential monitoring) and each of the 7 steps (Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Action & Objectives).Papers
· 3-5 page length (including title page, does not include reference page)
· Fonts: 11-point Calibri, 11-point Arial, 10-point Lucida Sans Unicode, 12-point Times New Roman, 11-point Georgia, 10-point Computer Modern
· Your paper should include four major sections:
· Title Page (included in 3-5 pages)
· Your Name
· Class Name
· Date
· Title of Assignment
· Abstract
· Summary of assignment in 3-5 sentences
· Main Body
· Supporting details and paragraphs
· References (not included in 3-5 pages)
· APA Formatting and Style
· https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/reference_list_author_authors.htmlLinks to an external site.
Defensive Book:
Defensive Security Handbook, use Table 1-1, Ransomware Use Case as your guide for this assignment
1.1 A screenshot of a security handbook Description automatically generated
1.2 A close-up of a document Description automatically generated
Written Focus: Case study 2
Choose an interesting, current cybercrime/cybersecurity open source article, follow the course rubric and APA format, summarize this article explaining why you chose it and how its interesting to you. Your article summarization will align with this weeks discussion board.
Recent Comments