Question

In: Computer Science

Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload...

Assignment task

Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following

Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  

Item 2: Virus/Malware details:

  1. Name of malware/virus
  2. When and where was this virus/malware first discovered?
  3. How prevalent is this virus/malware? Is it regionalized by geography or business sector? Is it worldwide? How many computers/victims has it claimed?
  4. What has been the impact of this particular virus/malware? Has it damaged computers/data? Has it caused the loss of revenue or reputation? Has it physically damaged anything?
  5. Description of the virus/malware:

What specifically does the virus/malware do? How does it infect targets? What does it do once it infects a host? Does it change registry settings, does it leave behind malicious code, etc...? Is it destructive? If so how?

Item 3 - Malware/Virus removal - How effective is software in removing it? What has to be done to remove it? What can be done to prevent being impacted by it?

Example of what I am looking for: Leading anti-virus/malware products such as <Name some products> are effective in removing the malicious .DLL, They do this by first configuring Internet Explorer to not run the .DLL and then deleting the malicious .DLL itself.

Solutions

Expert Solution

Let's discuss all the 3 Items one by one:

Item 1:

  • Virus: A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its code.
  • Malware: Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network.
  • History: The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971.
  • It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.
  • The first computer virus for MS-DOS was "Brain" and was released in 1986.
  • Unexpected pop-ups which appear on your screen are a typical sign of a malware infection that wreaks havoc on your computer.
  • This form of malware is known as spyware and is designed to collect and steal users' sensitive data without their knowledge.

Item 2:

Name of the malware: Code Red

  • It first surfaced in 2001 and was discovered by two eEye Digital Security employees.
  • It was named Code Red because the pair were drinking Code Red Mountain Dew at the time of discovery.
  • Once infected, it will proceed to make a hundred copies of itself but due to a bug in the programming.
  • The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system.
  • It will duplicate even more and ends up eating a lot of the systems resources.it will duplicate even more and ends up eating a lot of the systems resources.

Name of the malware: Melissa

  • Named after an exotic dancer from Florida, it was created by David L. Smith in 1999.
  • The virus will mail itself to the top 50 people in the user’s email address book.
  • It increases the email traffic, disrupting the email services of governments and corporations.

Item 3:

  • Antivirus software works by identifying similar patterns from its database or using tools to help predict when an attack will occur.
  • It uses a multi-pronged approach because viruses can adapt, transform, and get stronger over time.
  • When the antivirus finds and malicious file, it, first of all, isolate it from all the execution so that it doesn't get executed and after that antivirus finally deletes the malicious file itself.

Please let me know in the comments in case of any confusion. Also, please upvote if you like.


Related Solutions

Use your favorite search engine and search for “world’s greatest data breaches and hacks.” Scan through...
Use your favorite search engine and search for “world’s greatest data breaches and hacks.” Scan through the hits until you find visual diagrams or a text-based list of major data breaches that have occurred recently. (Major data breaches are defined as those in excess of 30,000 records.) Select and carefully review at least two of these data breaches. Briefly describe the two data breaches you selected. Explain in layman’s terms how you think these breaches occurred. Discuss whether or not...
use your favorite search engine to find the IRS' website ans locate Publication 537:"Installment Sales." after...
use your favorite search engine to find the IRS' website ans locate Publication 537:"Installment Sales." after reviewing that publication, answer the following questions: 1) which form is used to report an installment sale? 2)what are the requirements to report a sale on the installment basis for tax purposes? 3)If the taxpayer receives money over several periods, why would a taxpayer want to report a sale on the installment basis, rather than in the tax period when the sale oringinated? 4)...
  Why do you think Google dominates as a search engine?  What's your favorite search engine and why...
  Why do you think Google dominates as a search engine?  What's your favorite search engine and why -- or do you not prefer one over the other?  What do you think makes a good search engine?  Can you think of any features that search engines could potentially add? answer in 1-2 paragraphs
Conduct a web search on "The best and worst PowerPoint presentations" using your favorite search engine......
Conduct a web search on "The best and worst PowerPoint presentations" using your favorite search engine... which is google. give two reasons why this website was your choice of either the best or worst PowerPoint presentation and discuss what should or should not be done when creating a PowerPoint presentation. At the end of the oaragraph put the URL of the website.
Using your favorite search engine, research the mission and vision statements of different fortune 500 companies....
Using your favorite search engine, research the mission and vision statements of different fortune 500 companies. Then, you will response must be 750 words in which you compare and contrast the mission statements of two companies and the vision statements of two companies. You may use the same companies for both the mission and vision comparisons or separate companies.
(1) Use a search engine to find two different online data markets. Write a report sharing...
(1) Use a search engine to find two different online data markets. Write a report sharing the sources or focus of information each provides, the availability of visualization tools to preview data, and how developers can access or incorporate the data into their and websites.
Assignment Details Scenario: While reading a news article on your favorite athletic shoes, you are surprised...
Assignment Details Scenario: While reading a news article on your favorite athletic shoes, you are surprised to learn the company uses child labor in Pakistan. Living in the United States, it is hard to imagine children working in factories. What is child labor? According to Fairtrade International, child labor is “work that is harmful to a child’s physical and mental health and wellbeing, and/or interferes with their education, leisure and development” (2017). The exploitation of child labor continues to be...
In this assignment you will create a web page about your favorite sports to play or...
In this assignment you will create a web page about your favorite sports to play or teams to watch. If you don’t watch or play sports, please make up your favorite sports to play or teams to watch. You will be incorporating images into your web page, as well as other concepts learned in this unit. Create an external style sheet using a text editor of your choosing. In the CSS file add the following style rules: A background image...
Use your favorite text editor or IDE to search for occurrences of setState. Where you found...
Use your favorite text editor or IDE to search for occurrences of setState. Where you found uses of setState, refactor the code to use JavaScript functions instead of classes and the useState hook instead of setState. import React from 'react' import ColorSlider from './ColorSlider' import ColorOutput from './ColorOutput' import styles from './ColorBrowser.module.css' class ColorBrowser extends React.Component { constructor(props) { super(props) this.state = { red: Math.floor(Math.random() * 256), green: Math.floor(Math.random() * 256), blue: Math.floor(Math.random() * 256) } } updateColor(e) { this.setState({...
Find 1 research article related to search engine technology and summarize. (It could also be an...
Find 1 research article related to search engine technology and summarize. (It could also be an article related to agents and search engines or text retrieval if you prefer). The research article should be from a research conference or journal.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT