Malware Attack

 

Playbooks, sometimes known as Standard Operating Procedures (SOPs) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions.

During weeks 2, 3, and 5, you will develop individual playbooks for a fictional company that hired you to write their playbooks and manage the team. The first playbook is a response to malware found at the company. Each week is a separate playbook and needs to have a cover page and references.

Outline a 2- to 3-page playbook in Microsoft Word or Word Compatible to address a category of malware attacks of your choice.

Complete the following in your playbook:

Provide details of the malware category.
Identify the expected vulnerability and attack vector.
Analyze the vulnerability to determine 2 risks of this malware.
Outline step-by-step instructions on how to resolve the malware attack.

 

This question has been answered.

Get Answer