Setup a malware analysis lab

Assignment Help Computer Network Security
Reference no: EM132831828

TASK:

For the purpose of this CA you are expected to setup a malware analysis lab (please note that you are not allowed to just download an existing sandbox, but you can include a critical analysis discussing how looking at such sandboxes you learned good practices on creating your lab). In addition, you should carry out a research-based investigation into a piece of malware. The students will have to document the work carried in the form of a report and include clear evidence (descriptions and screenshots).

REPORT STRUCTURE:
1. Malware Lab
a) VM Setup: Description and justifications of the VM setup (i.e., guest Windows OS version and configuration details, VM settings, etc.).
b) Software Tools: Description of the software tools installed and justifications of their selection (i.e., vis-a-vis alternative tools).
c) Gateway: Description of the virtual gateway setup and/or other network components (if any).
d) Lab Testing: Description d justification of the testing activities carried out to ensure that the lab is properly configured and isolated from the production environment (i.e., host, net

2. Research-based Malware Analysis
a) Executive Summary: Brief description the objective and key findings of the analysis.
b) Identification: Description of the malware sample, and any information available in the public domain or that can be obtained using an online tool: e.g., type of the file, its name, size, hashes, malware names (if known), current anti-virus detection capabilities, etc.

c) Analysis: detailed descriptions of the malware capabilities, behaviour, etc. This analysis should be conducted without downloading the malware using only online resources such as research papers (i.e., check Google Scholar), malware analysis reports previously done by companies/ bloggers, online tools and sandboxes (e.g., VirusTotal, ThreatMiner, Joe Sandbox), etc.In your analysis identify those parts which are Static Anoiysis, and those which constitute

d) Conclusions: Summary of findings, recommendations and next steps (i.e., whet would you do if you would download the sample malware).

Cyber Kill Churn. Explain your findings by way of the Cyber Kill Chain - what indicators can be used to implements mitigations at each stnge of the Kill Chain.

3. References Include references to all the resources you consulted when preparing this CA (e.g., research papers, web resources, etc.)

4. Appendix: Include screenshots and any additional details if required (as the main part of the report should be limited to 10 pages in a simple 1 column 12pt format).

1 INTRODUCTION
1.1 MALWARE LAB ENVIRONMENT
1.2 VIRTUAL MACHINE LAB SETUP
1.3 WINDOWS 7 32-bit
2 TOOLS USED
2.1 GATEWAY
2.2 LAB TESTING
3 RESEARCH BASED ON MALWARE ANALYSIS
3.1 EXECUTIVE SUMMARY
3.2 IDENTIFICATION
3.3 ANALYSIS
4 CYBER KILL CHAIN OF
REMEDIES TO STOP MALWARE
CONCLUSION
REFERENCES
APPENDIX

Attachment:- Malware analysis lab.rar

Reference no: EM132831828

Questions Cloud

Discuss why detecting outliers is important : Discuss why detecting outliers is important and what happens if you do not remove them from the data?
Policing policies analysis : Describe the selected police policy. Provide an example of the policy in use. Discuss how the police policy was created.
What is the present value of growth opportunities : The company plans to reinvest 30% of its earning to generate a ROE of 15%. If cost of equity is 11% what is the present value of growth opportunities
Create parallel structure using coordinating conjunctions : Revise each of the following sentences to create parallel structure using coordinating conjunctions.
Setup a malware analysis lab : Critical analysis discussing how looking at such sandboxes you learned good practices on creating your lab - Brief description the objective and key findings
What about as a young adult in the workplace : What about as a young adult in the workplace? Are ethical values clear and universal or is there some room for debate?
What was the company cost of goods sold for the month : Gabel Inc. is a merchandising company. Last month, the company's merchandise purchases totaled $63,000. What was the company cost of goods sold for the month
What was the history in flint michigan in the 10 years : What was the history in Flint Michigan in the 10 years prior to 2014 that may have contributed to the water crisis?
Good-faith exception to exclusionary rule : Describe in detail the good-faith exception to the exclusionary rule and the reasoning and intention behind the SCOTUS's judgment.

Reviews

len2831828

3/18/2021 3:28:52 AM

I have attached the report structure, requirements and relevant documents for your reference. It is a single column with paragraph font size 12pt. Would you mind provide me with the quote now? Many thanks

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd