100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Summary

Summary - CSC 385 (CSC385) Midterm 1 Exam {answered}

Rating
-
Sold
-
Pages
14
Uploaded on
18-09-2024
Written in
2024/2025

Northern Kentucky University CSC 385 Midterm exam Q1: Review the following case study where they discussed an old Malware. Generate an STIX structure based on the information provided in the article. Q2: In the class, we talked about five different type of source of threat data. Mention 3 sources/sites for each of the five categories (Total 15). For each of the five categories, explain the threat related information you received (eg. Attackers tactic, technique, procedure, threat data, malware signature, countermeasure, attack group etc).

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 18, 2024
Number of pages
14
Written in
2024/2025
Type
Summary

Subjects

Content preview

Emily Carson


February 9, 2024


Midterm One


Q1: Review the following case study where they discussed an old Malware. Generate an STIX

structure based on the information provided in the article.


{

“type”: “malware” ,

“spec_version”: “3.0” ,

“id”: “aids – trojans – ransomware” ,

“created”: “1989-12-01T00:00:00Z” ,

“modified”: “1989-12-01T00:00:00Z” ,

“name”: “AIDS Trojan (PC Cyborg) ” ,

“description": “AIDS Trojan is the first Ransomware attack that was launched in
December 1989, and it was called PC Cyborg or AIDS Trojan. The attack was distributed
by Dr. Joseph L. Popp. ” ,

“labels”: [“ransomware”] ,

“is_family”: false ,

“kill_chain_phases”: [ {

“kill_chain_name”: “cyber-attack_lifecycle” ,

“phase_name”: “delivery”

},

{

“kill_chain_name”: “cyber-attack_lifecycle” ,

, “phase_name”: “exploitation”

},

{

“kill_chain_name”: “cyber-attack_lifecycle” ,

“phase_name”: “isntallation”

},

{

“kill_chain_name”: “cyber-attack_lifecycle” ,

“phase_name”: “impact”

}],

“malware_types”: [ “Trojan” ] ,

“delivery_methods”: [ {

“name”: “physical”

“description”: “Infected floppy disks labeled as AID Information Introductory
Diskette were mailed to victims.”

}]

}

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Topscorer london
View profile
Follow You need to be logged in order to follow users or courses
Sold
117
Member since
5 year
Number of followers
13
Documents
454
Last sold
1 day ago
Top Scorer

Helping all Students fulfill their educational, career and personal goals.

4.3

24 reviews

5
16
4
3
3
3
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions