Please see attached
Case Study 1
· Written Application Focus: In the textbook, Defensive Security Handbook, use Table 1-1, Ransomware Use Case as your guide for this assignment. Outline the step-by-step kill chain use case for a phishing attack. Be sure to include all 4 categories (Kill chain step, Malicious action, Defensive mitigation and potential monitoring) and each of the 7 steps (Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Action & Objectives).Papers
· 3-5 page length (including title page, does not include reference page)
· Fonts: 11-point Calibri, 11-point Arial, 10-point Lucida Sans Unicode, 12-point Times New Roman, 11-point Georgia, 10-point Computer Modern
· Your paper should include four major sections:
· Title Page (included in 3-5 pages)
· Your Name
· Class Name
· Date
· Title of Assignment
· Abstract
· Summary of assignment in 3-5 sentences
· Main Body
· Supporting details and paragraphs
· References (not included in 3-5 pages)
· APA Formatting and Style
Defensive Book:
Defensive Security Handbook, use Table 1-1, Ransomware Use Case as your guide for this assignment
1.1
1.2
Written Focus:
Case study 2
Choose an interesting, current cybercrime/cybersecurity open source article, follow the course rubric and APA format, summarize this article explaining why you chose it and how it’s interesting to you. Your article summarization will align with this week’s discussion board.