What advantages and disadvantages of defining a new protocol


Problem

A. Consider a smart phone. Identify two MITRE ATT&CK Framework techniques to install malicious code onto a smart phone. Describe each method. What are the differences between the two. Please find process differences rather than one m for Android and another for iPhone.

B. What is Command and Control? From the attackers perspective, what are the advantages and disadvantages of defining a new protocol versus leveraging an existing legitimate protocol for communication? This answer may be based on the Enterprise or Mobile framework. Please note which framework was used.

C. Cite a news article that relates to an identified attack related to the Collection tactic. Describe the incident using a couple of paragraphs. What happened? What data was collected? Is there enough information in the article to map the incident to a specific MITRE ATT&CK Collection technique? Which technique is the best fit and why? This answer may be based on the Enterprise or Mobile framework. Note which framework was used.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What advantages and disadvantages of defining a new protocol
Reference No:- TGS03241881

Expected delivery within 24 Hours