Computer Science Homework Help

Ashford University Government Regulations in Cybersecurity Malware Analysis Paper

 

1. Identify the type of attack that is taking placed based on the network traffic you have observed.

undefined

2. Identify the potential patient zero or point of compromise; this is the first point of observable compromise.

undefined

3. Undertake a more in-depth traffic analysis to detect anomalies or other points of interest.

undefined

4. Attribution of the compromise to a machine within the internal network, a group, or a person.

undefined

5. Recommendation to the Forensic Investigations Team as to which endpoints to image and investigate as part of further analysis.