Analysis should include the following:
- Viruses
- Crypto-malware
- Ransomware
- Worm
- Trojan
- Rootkit
- Keylogger
- Adware
- Spyware
- Bots
- Remote Access Trojan (RAT)
- Logic bomb
- Backdoor
Process/Skill Questions:
- What are some examples of ransomware attacks?
- What process is used to uncover a rootkit?
- Which malware can be delivered via email?