The paper must be in APA Format at least 10 pages not including the cover page, abstract, outline, and references. The paper will be graded technical content and APA Format. A Kill Chain Analysis is required.
Organize your paper and address as many of the following items as possible:
1. Background Regarding the Malware
a. General Description: When, where and how was the malware discovered
b. Category of Malware: Virus, Worm, Trojan, etc.
2. Technical Detail Regarding the Malware
a. National Vulnerability Database Information: Common Vulnerability and Exposure Listing, Common Attack Pattern Exploited, Aliases, Variants, etc.
b. Technical Information: Vulnerabilities Exploited, Infection Mechanism, Applications, Operating Systems, Hardware Affected, Unique characteristics, etc.
c. Payload Information: Trojan, Rootkit, Backdoor, Keylogger, etc.
d. Propagation Mechanisms: Worm, Email, Botnet, Social Media, Supply Chain, etc.
e. Obfuscation Techniques: Compression, encryption, polymorphism, anti-debugging, anti-disassembly
f. General and specific detection techniques
g. Remediation actions/procedures
3. Impacts of the Malware
a. Describe the Political, Social and Economic effects
b. Target of the attacks: Government, Users and Industry.
c. Magnitude of attacks: Global, Nation State, Local
d. Costs: Remediation, economic losses, etc.
e. Action Taken: Political/Government, Legal proceedings, Charges, Prosecution
4. Malware Cybersecurity Attack Lifecycle Analysis and Mitigation Techniques
a. Reconnaissance: Detect Potential Attack
b. Weaponization: Deny Attacker Information
c. Delivery: Disrupt Attackers Attempts
d. Exploit: Degrade Effectiveness or Deflect Attack
e. Control: Deceive Attacker
f. Execute: Destroy Attackers Capability to Execute
g. Maintain: Recover from Attack