Setup a malware analysis lab

Assignment Help Computer Network Security
Reference no: EM132831828

TASK:

For the purpose of this CA you are expected to setup a malware analysis lab (please note that you are not allowed to just download an existing sandbox, but you can include a critical analysis discussing how looking at such sandboxes you learned good practices on creating your lab). In addition, you should carry out a research-based investigation into a piece of malware. The students will have to document the work carried in the form of a report and include clear evidence (descriptions and screenshots).

REPORT STRUCTURE:
1. Malware Lab
a) VM Setup: Description and justifications of the VM setup (i.e., guest Windows OS version and configuration details, VM settings, etc.).
b) Software Tools: Description of the software tools installed and justifications of their selection (i.e., vis-a-vis alternative tools).
c) Gateway: Description of the virtual gateway setup and/or other network components (if any).
d) Lab Testing: Description d justification of the testing activities carried out to ensure that the lab is properly configured and isolated from the production environment (i.e., host, net

2. Research-based Malware Analysis
a) Executive Summary: Brief description the objective and key findings of the analysis.
b) Identification: Description of the malware sample, and any information available in the public domain or that can be obtained using an online tool: e.g., type of the file, its name, size, hashes, malware names (if known), current anti-virus detection capabilities, etc.

c) Analysis: detailed descriptions of the malware capabilities, behaviour, etc. This analysis should be conducted without downloading the malware using only online resources such as research papers (i.e., check Google Scholar), malware analysis reports previously done by companies/ bloggers, online tools and sandboxes (e.g., VirusTotal, ThreatMiner, Joe Sandbox), etc.In your analysis identify those parts which are Static Anoiysis, and those which constitute

d) Conclusions: Summary of findings, recommendations and next steps (i.e., whet would you do if you would download the sample malware).

Cyber Kill Churn. Explain your findings by way of the Cyber Kill Chain - what indicators can be used to implements mitigations at each stnge of the Kill Chain.

3. References Include references to all the resources you consulted when preparing this CA (e.g., research papers, web resources, etc.)

4. Appendix: Include screenshots and any additional details if required (as the main part of the report should be limited to 10 pages in a simple 1 column 12pt format).

1 INTRODUCTION
1.1 MALWARE LAB ENVIRONMENT
1.2 VIRTUAL MACHINE LAB SETUP
1.3 WINDOWS 7 32-bit
2 TOOLS USED
2.1 GATEWAY
2.2 LAB TESTING
3 RESEARCH BASED ON MALWARE ANALYSIS
3.1 EXECUTIVE SUMMARY
3.2 IDENTIFICATION
3.3 ANALYSIS
4 CYBER KILL CHAIN OF
REMEDIES TO STOP MALWARE
CONCLUSION
REFERENCES
APPENDIX

Attachment:- Malware analysis lab.rar

Reference no: EM132831828

Questions Cloud

Discuss why detecting outliers is important : Discuss why detecting outliers is important and what happens if you do not remove them from the data?
Policing policies analysis : Describe the selected police policy. Provide an example of the policy in use. Discuss how the police policy was created.
What is the present value of growth opportunities : The company plans to reinvest 30% of its earning to generate a ROE of 15%. If cost of equity is 11% what is the present value of growth opportunities
Create parallel structure using coordinating conjunctions : Revise each of the following sentences to create parallel structure using coordinating conjunctions.
Setup a malware analysis lab : Critical analysis discussing how looking at such sandboxes you learned good practices on creating your lab - Brief description the objective and key findings
What about as a young adult in the workplace : What about as a young adult in the workplace? Are ethical values clear and universal or is there some room for debate?
What was the company cost of goods sold for the month : Gabel Inc. is a merchandising company. Last month, the company's merchandise purchases totaled $63,000. What was the company cost of goods sold for the month
What was the history in flint michigan in the 10 years : What was the history in Flint Michigan in the 10 years prior to 2014 that may have contributed to the water crisis?
Good-faith exception to exclusionary rule : Describe in detail the good-faith exception to the exclusionary rule and the reasoning and intention behind the SCOTUS's judgment.

Reviews

len2831828

3/18/2021 3:28:52 AM

I have attached the report structure, requirements and relevant documents for your reference. It is a single column with paragraph font size 12pt. Would you mind provide me with the quote now? Many thanks

Write a Review

Computer Network Security Questions & Answers

  What you have done to protect the network

Prepare a 2-page memo in Word outlining what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against other security concerns including worms, viruses

  Theory of language development

What factors can positively and negatively affect language development and how parents can enhance language development in young children

  Describe the actions of the student using the web browser

COIT20262 - Advanced Network Security Assignment. Describe the actions of the student using the web browser. That is, give the links they clicked on (or typed in), the exact time when they clicked on it (relative to the first packet captured), any ..

  Future threats to network security - research paper

Deliver a research paper and presentation based on your research - Future threats to network security and planning for those threats

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  How will cross-forest trusts be implemented

CMIT-371 Windows Network ServicesProposal- How will Forest Functional Levels be implemented? How will cross-forest trusts be implemented? How will replication be handled? Read-Only Domain Controllers - how and where will they be used?

  Research the elements of a multilayered security plan

You need to research the elements of a multilayered security plan and to create a detailed outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure

  How would matt get joel to support his ideas

Describe your top ideas for Matt to present to Joel next week. How would Matt get Joel to support his ideas?

  Protecting and securing any kind of network

Protecting and securing any kind of network is our responsibility as a network engineer. No matter what kind of situation we get into weather good or bad we have to stick to our ethics and knowledge to provide the best service and support to our c..

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Determine plaintext and key from affine cipher

Below are given of ciphertext, from Affine cipher. Determine the plaintext and key. Give a clearly written description of the steps you followed to decrypt each ciphertext.

  Describe two potential computer ethics issues associated

Describe two potential computer ethics issues associated with holding computers hostage. Propose two methods that computer users could use to prevent this type of attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd