Topic 1 DQ 1
Research one malware attack that you or someone else experienced.
All users of computing systems have experienced at least one computer attack from malware. Research one malware attack that you or someone else experienced. From your perspective explain:
- What happened?
- What type of damage was inflicted?
- How was the damage repaired?
- How was the computer fixed after the attack?
- How can the attack be avoided in the future?
Topic 1 DQ 2
As anti-malware tools improve, attackers look for other easy attack vectors. Social Engineering is one of those attack vectors. Using Case Project 2-2 found in your text as a guide, create a scenario that could be used to train an organization’s employees on this potential attack. Keep in mind this is a wetware attack. Explain how your scenario will provide information that would be beneficial to the attacker in future exploitation of the organization.