Question

In: Computer Science

What is it called when a malicious program obtains access to an otherwise inaccessible functionality?

What is it called when a malicious program obtains access to an otherwise inaccessible functionality?

Solutions

Expert Solution

It is called as a malicious software or malware when a malicious program obtains access to an otherwise inaccessible functionality

The words “Malicious Software” laso called as “Malware” and the meaning remains the same.

  • Malicious Software refers to any malicious program that causes harm to a computer system or network.
  • Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits.
  • Their mission is often targeted at accomplishing unlawful tasks such as robbing protected data, deleting confidential documents or add software without the user consent.

Different Types of Malicious Software

Computer Virus

  • A computer virus is a malicious software which self-replicates and attaches itself to other files/programs.
  • It is capable of executing secretly when the host program/file is activated. The different types of Computer virus are Memory-Resident Virus, Program File Virus, Boot Sector Virus, Stealth Virus, Macro Virus, and Email Virus.

Worms

  • A worm is a malicious software which similar to that of a computer virus is a self-replicating program, however, in the case of worms, it automatically executes itself.
  • Worms spread over a network and are capable of launching a cumbersome and destructive attack within a short period.

Trojan Horses

  • Unlike a computer virus or a worm – the trojan horse is a non-replicating program that appears legitimate.
  • After gaining the trust, it secretly performs malicious and illicit activities when executed.
  • Hackers make use of trojan horses to steal a user’s password information, destroy data or programs on the hard disk. It is hard to detect

Spyware/Adware

  • Spyware secretly records information about a user and forwards it to third parties.
  • The information gathered may cover files accessed on the computer, a user’s online activities or even user’s keystrokes.


Related Solutions

Q1. In order to limit the creation of malicious code, do you think that access to...
Q1. In order to limit the creation of malicious code, do you think that access to elements of the document object model and some Javascript functionality be limited? In discussing your answer, describe two types of computer attacks/ viruses that may be initiated by scripting code in the browser environment. What else can we do to combat this? Q2. The ideal of the Web is based on open interchange of ideas, information and code. However, sometimes a lot of work...
To gain further understanding of some functionality of the brain, complete the following: outlining what functionality...
To gain further understanding of some functionality of the brain, complete the following: outlining what functionality could be affected if an individual suffered damage to the cerebral cortex. Be sure to explain about what you learned about cerebral cortex, what would happen if it were damaged, and why you believe knowledge of this information is important to psychologist? Explain the roles of each following plays in sending a message through a neuron: dendrites, axon, myelin sheath
Gru's schemes have a/an 9% chance of succeeding. An agent of the Anti-Villain League obtains access...
Gru's schemes have a/an 9% chance of succeeding. An agent of the Anti-Villain League obtains access to a simple random sample of 1100 of Gru's upcoming schemes. Find the probability that... (Answers should be to four places after the decimal, using chart method, do NOT use the continuity correction): ...less than 101 schemes will succeed:    ...more than 95 schemes will succeed: ...between 95 and 101 schemes will succeed:   ...less than 8.5% of schemes will succeed: ...more than 9.5% of schemes...
Gru's schemes have a/an 9% chance of succeeding. An agent of the Anti-Villain League obtains access...
Gru's schemes have a/an 9% chance of succeeding. An agent of the Anti-Villain League obtains access to a simple random sample of 1100 of Gru's upcoming schemes. Find the probability that... (Answers should be to four places after the decimal, using chart method, do NOT use the continuity correction): ...between 95 and 101 schemes will succeed: ...less than 8.5% of schemes will succeed: ...more than 9.5% of schemes will succeed: ...between 8.5% and 9.5% of schemes will succeed:
Gru's schemes have a/an 11% chance of succeeding. An agent of the Anti-Villain League obtains access...
Gru's schemes have a/an 11% chance of succeeding. An agent of the Anti-Villain League obtains access to a simple random sample of 1100 of Gru's upcoming schemes. Find the probability that... (Answers should be to four places after the decimal, using chart method, do NOT use the continuity correction): ...less than 101 schemes will succeed: ...more than 95 schemes will succeed: ...between 95 and 101 schemes will succeed: ...less than 8.5% of schemes will succeed: ...more than 9.5% of schemes...
there are files called LinkedList.h, and Array.h and all the functionality you need has already been...
there are files called LinkedList.h, and Array.h and all the functionality you need has already been implemented. There is also a file called TimeSupport.h that allows you to measure the running time of code segments. There is also a file called RandomSupport.h, which you can use to generate good random numbers. In your app.cpp , create a demo illustrating a scenario where storing numbers in a linked list is more efficient than an array. Your demo should generate a sufficiently...
In MPLAB write and compile (using the simulator) an assembly language program with the following functionality:...
In MPLAB write and compile (using the simulator) an assembly language program with the following functionality: Configures pin RA2 of the PIC24to be an output to control an attached LED. Configures pin RB13 of the PIC24 to be an input to read the value on an attached switch (this switch will connect to ground when pressed). Configures pin RB13 to use the internal pull-up resistor. After configuration, the LED will be "off" when the push-button is pressed, and "on" when...
In a memory system, when the access time of the cache is 10ns and the access...
In a memory system, when the access time of the cache is 10ns and the access time of the main memory is 50ns, what is the hit ratio of the cache if the effective access time is 10% larger than the access time of the cache? (Up to 4 digits below the decimal point) please detail explanation
Write a short bash program that aligns with the below functionality. $ sh ~/cs210_list.sh Error: missing...
Write a short bash program that aligns with the below functionality. $ sh ~/cs210_list.sh Error: missing argument $ echo $? 1 $ sh ~/cs210_list.sh /non-exist Error: ‘/non-exist’ is an invalid directory $ echo $? 1 $ sh ~/cs210_list.sh /etc File: aavark File: aabbb Size: 16 File: aaacccc File: aaaaddd Size: 1585 File: aliases~ Size: 1686 File: aliases.db Size: 12288 ... Notice: It error checks that the first argument exists and is a directory. It generates an error message and returns...
Acquired immunity that a fetus obtains from maternal antibodies that cross the placenta is called: Artificially...
Acquired immunity that a fetus obtains from maternal antibodies that cross the placenta is called: Artificially acquired natural immunity. Naturally acquired passive immunity. Naturally acquired active immunity. Artificially acquired active immunity. Which of the following are roles of the lymphatic system? Filtering, recycling, and producing lymph. Collecting surplus fluids. Absorbing fat-soluble molecules from the digestive tract. All of the above. Which of the following cells plays a role in both specific and non-specific defenses? Neutrophils Lymphocytes Macrophages Eosinophils What are...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT