Identifying and embedding common indicators of compromise in virtual machines for lab-based incident response education
Van Dusen, Matthew S.
Fulp, John D.
MetadataShow full item record
Though typical malware delivery vectors, behaviors, and general attack craft can be verbally explained and even illustrated, greater familiarity and confidence is imbued in the cyber defender when such theoretical explanations are followed by guided practical exercises that provide realistic scenarios. To demonstrate this, we created seven scenarios utilizing common attack types combined with prominent artifacts for indicators of compromise and prominent incident investigative tools. These scenarios will help facilitate the educational experience for students as well as instill confidence, resulting in more proficient incident response across the field. Should this type of education become a part of the NPS curriculum, additional research can be conducted to reaffirm its true capacity.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Hyun, Dahae (Monterey, California: Naval Postgraduate School, 2018-03);Operational technology, information technology for industrial control systems, has advanced more slowly in security than other kinds of information technology. To aid the discovery of indicators of compromise for industrial ...
Juan, Clifford C. (Monterey, California. Naval Postgraduate School, 2007-09);The introduction of Microsoft's new graphics file format, Windows Media Photo, into the mainstream market in 2006 has been one of the most interesting developments in the digital world. The file format, which has since ...
Yen, Jerome; Bui, Tung X. (1999);It has been observed that in single voting unanimity can rarely be reached. In many situations, however, members may not be aware that their preferences as expressed by their votes may contain room for compromise. This ...