Chat with us, powered by LiveChat Module 06 Course Project – Analyze Malware Behavior | excelpaper.org/
+1(978)310-4246 credencewriters@gmail.com
  

the assignment is in the attachment. please follow the instructions carefully.

Module 0x Course Project: xx

Click to add text

Click to add text

1/11/2022 Copyright Rasmussen College, LLC Proprietary and Confidential

1/11/2022 Copyright Rasmussen College, LLC Proprietary and Confidential

1/11/2022 Copyright Rasmussen College, LLC Proprietary and Confidential

image1.jpg

image3.jpg

image5.jpg

image6.jpg

Module 01 Further Resources

Review the following videos. (
Note: If one of the links is not working, do a search on the title of the video.)

· Defcon 17: Making Fun of your Malware

·
DEFCON 19 (2017) Malware Freakshow 3

·
Cracking Stuxnet, a 21st-century cyber weapon

Module 04 Further Resources

Review the following videos. (
Note: If one of the links is not working, do a search on the title of the video.)

·
x86 Assembly Crash Course

·
x86 Assembly Language (Parts 1 – 5)

·
Comparing C to Machine Language

Module 05 Further Resources

Review the following videos. (
Note: If one of the links is not working, do a search on the title of the video.)

·
SANS DFIR Webcast – What’s New in REMnux v4 for Malware Analysis?

Module 06 Further Resources

Review the following readings. (
Note: If one of the links is not working, do a search on the similarly titles resources.)


·
Mastering 4 Stages of Malware Analysis

·
3 Phases of Malware Analysis: Behavioral, Code, and Memory Forensics

·
How to Get Started With Malware Analysis

·
Becoming an Expert in 4 Stages of the Malware Analysis

·
Detecting malware through static and dynamic techniques

<

NIST Special Publication 800-83
Revision 1

Guide to Malware Incident
Prevention and Handling for

Desktops and Laptops

Murugiah Souppaya
Karen Scarfone

C O M P U T E R S E C U R I T Y

karenw
Typewritten Text
http://dx.doi.org/10.6028/NIST.SP.800-83r1

NIST Special Publication 800-83
Revision 1

Guide to Malware Incident
Prevention and Handling for

Desktops and Laptops

Murugiah Souppaya
Computer Security Division

Information Technology Laboratory

Karen Scarfone
Scarfone Cybersecurity

Clifton, VA

July 2013

U.S. Department of Commerce
Cameron F. Kerry, Acting Secretary

National Institute of Standards and Technology

Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director

karenw
Typewritten Text
http://dx.doi.org/10.6028/NIST.SP.800-83r1

ii

Authority

This publication has been developed by NIST to further its statutory responsibilities under the Federal
Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for
developing information security standards and guidelines, including minimum requirements for Federal
information systems, but such standards and guidelines shall not apply to national security systems
without the express approval of appropriate Federal officials exercising policy authority over such
systems. This guideline is consistent with the requirements of the Office of Management and Budget
(OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-
130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130,
Appendix III, Security of Federal Automated Information Resources.

Nothing in this publication should be taken to contradict the standards and guidelines made mandatory
and binding on Federal agencies by the Secretary of Commerce under statutory authority. Nor should
these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of
Commerce, Director of the OMB, or any other Federal official. This publication may be used by
nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States.
Attribution would, however, be appreciated by NIST.

National Institute of Standards and Technology Special Publication 800-83 Revision 1
Natl. Inst. Stand. Technol. Spec. Publ. 800-83r1, 47 pages (July 2013)

http://dx.doi.org/10.6028/NIST.SP.800-83r1
CODEN: NSPUE2

error: Content is protected !!