Problem
A. Consider a smart phone. Identify two MITRE ATT&CK Framework techniques to install malicious code onto a smart phone. Describe each method. What are the differences between the two. Please find process differences rather than one m for Android and another for iPhone.
B. What is Command and Control? From the attackers perspective, what are the advantages and disadvantages of defining a new protocol versus leveraging an existing legitimate protocol for communication? This answer may be based on the Enterprise or Mobile framework. Please note which framework was used.
C. Cite a news article that relates to an identified attack related to the Collection tactic. Describe the incident using a couple of paragraphs. What happened? What data was collected? Is there enough information in the article to map the incident to a specific MITRE ATT&CK Collection technique? Which technique is the best fit and why? This answer may be based on the Enterprise or Mobile framework. Note which framework was used.