Develop 2 strategies each on how you would handle the two nefarious scenarios above (phishing email and malware zip)

1. Create Email 1 with the attachment:
a.On a Windows 7 VM, locate the file CMD.EXE and add it to a zip file
b.Name it: Documents.zip
c.This will be the potentially nefarious zip file your user sent to you

i.Google 3 prevalent / current viruses or malicious logic currently trending today

1.Tell me what they do
2.Tell me how they are executed
3.Scan the zip file and show screen shot of results
2.Create the phishing email

a.Google phishing email examples and copy one of them into a word document
b.Name it Phishing Email.docx

i.Tell me what tells you it is a phishing email.
ii.Cite specific examples of what is wrong with the message and key indicators
3.

4 Develop 2 strategies each on how you would handle the two nefarious scenarios above (phishing email and malware zip) above.
HINT: Google metascan as a means to scan the zip
Deliverable: