100% found this document useful (1 vote)
338 views1 page

6.2.1.11 Lab - Anatomy of Malware - OK

This document provides objectives and background information for a lab on analyzing malware. The objectives are to research and analyze malware threats. Malware refers to malicious software programs that can harm systems, steal data, and bypass security. It is estimated that over one million new malware threats are released daily. The required resources include an internet-connected PC or mobile device. Students are asked to search for four recent examples of malware from different types (e.g. Trojan, adware), learn details on what each does, how they spread, and their impacts. They must then summarize one malware in 3 sentences.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
338 views1 page

6.2.1.11 Lab - Anatomy of Malware - OK

This document provides objectives and background information for a lab on analyzing malware. The objectives are to research and analyze malware threats. Malware refers to malicious software programs that can harm systems, steal data, and bypass security. It is estimated that over one million new malware threats are released daily. The required resources include an internet-connected PC or mobile device. Students are asked to search for four recent examples of malware from different types (e.g. Trojan, adware), learn details on what each does, how they spread, and their impacts. They must then summarize one malware in 3 sentences.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Lab – Anatomy of Malware

Objectives
Research and analyze malware

Background / Scenario
Malware, or malicious software, refers to a variety of malicious software programs that can be used to cause
harm to computer systems, steal data, and bypass security measures. Malware can also attack critical
infrastructure, disable emergency services, cause assembly lines to make defective products, disable electric
generators, and disrupt transportation services. Security experts estimate that more than one million new
malware threats are released each day. A McAfee Labs report indicates almost 500 million known malware
threats at the end of 2015.
Note: You can use the web browser in virtual machine installed in a previous lab to research security related
issues. By using the virtual machine, you may prevent malware from being installed on your computer.

Required Resources
• PC or mobile device with Internet access

Conduct a Search of Recent Malware


a. Using your favorite search engine, conduct a search for recent malware. During your search, choose four
examples of malware, each one from a different malware type, and be prepared to discuss details on
what each does, how it each is transmitted and the impact each causes.
Examples of malware types include: Trojan, Hoax, Adware, Malware, PUP, Exploit, and Vulnerability.
Some suggested web sites to search malware are listed below:
McAfee
Malwarebytes
Security Week
TechNewsWorld
b. Read the information about the malware found from your search in step 1a, choose one and write a short
summary that explains what the malware does, how it is transmitted, and the impact it causes.
____________________________________________________________________________________
____________________________________________________________________________________

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 1 www.netacad.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy