Question

In: Computer Science

Compare between malware that spread conceal in a table?

Compare between malware that spread conceal in a table?

Solutions

Expert Solution

Firstly what is the definition of malware?

It is a commonly form of software which is malicious and can be used for data stealing,lowering performance of computers,bypassing control access and so on.The different types of malware includes Viruses,Worm and Trojan Horses mainly.So the comparison goes like this:-

Virus Worm Trojan Horse
Definition A virus can be defined as a software where it attaches itself with the other program thereby decreasing performance It performs destructive functions by cosuming up the resources Trojan horse is that of malware which can be used to obtain and steal secret information through networks
Function Can be used to inject additional information and modifies the progran Memory and CPU abdruptly may stop if worm exists Data stealing
Spreading pace Spreads moderately Faster rating of spreading Comparatively slow rate
can it be controlled remotely? No Yes Yes
Can it replicate? Yes Yes No
When it occurs? Transferring file with human action required. Transferring file and human action action not required Mainly occurs when any software donloaded from internet which is not an authorised website.
Examples ILOVEYOU,Code Red W32.SillyFDC.BBY JS.Debeski.Trojan

Related Solutions

1. How does malware infect a computer? 2. How does malware spread? 3. How does the...
1. How does malware infect a computer? 2. How does malware spread? 3. How does the malware works? 4. Is virus and malware the same? 5. How do I manually remove malware? 6. What's an example of malware? 7. What is malware attack? 8. What is Worm malware? 9. What do computer viruses do? 10. How do I protect my computer from malware? 11. What is the best anti malware? 12. What is worm, a virus, and a Trojan horse?
Gadgets Inc. has the following information. Compare the spread between actual and sustainable growth for 1998...
Gadgets Inc. has the following information. Compare the spread between actual and sustainable growth for 1998 with the spread for 2001 only, what is the main reason for the change in spread? Compare the components of the sustainable growth rate for the two years to see how each has contributed to the decrease/increase in sustainable growth Gadgets ($ in millions) 1996 1997 1998 1999 2000 2001 Sales $      128.40 $        171.60 $       208.20 $      241.60      $        288.40 Net income...
In a table chart, compare the advantages and disadvantages between Southern, Northern & Western Blotting. (such...
In a table chart, compare the advantages and disadvantages between Southern, Northern & Western Blotting. (such as applications, expensiveness, tools, and/or timing to results etc.)
Describe the differences between malware analysis methods – Static vs Dynamic ▪
Describe the differences between malware analysis methods – Static vs Dynamic ▪
What’s the difference between switchgear and smart switchgear? Please compare them in a table if you...
What’s the difference between switchgear and smart switchgear? Please compare them in a table if you can
What are the ways to conceal theft and what are the principles of internal control?
What are the ways to conceal theft and what are the principles of internal control?
What is a covert channel and how is it useful to conceal pentest activity?
What is a covert channel and how is it useful to conceal pentest activity?
Explain the viruses and malware
Explain the viruses and malware
Compare the performance between linearSearch, BinarySearch, InsertOrdered and InsertNotOrdered using System.nanoTime(); Fill the following table          ...
Compare the performance between linearSearch, BinarySearch, InsertOrdered and InsertNotOrdered using System.nanoTime(); Fill the following table           Method N= 100 N = 1000 N = 100000 N=1000000 InsertOrdered Insert LinearSearch(find method in HighArray) BinarySearch Here is a sample code to read data from file import java.io.File; import java.io.FileNotFoundException; import java.util.Scanner; public class FileReaderSample {     public static void main(String[] args) throws FileNotFoundException {         Scanner in = new Scanner(System.in);         System.out.println("Please enter file name");       String s = in.nextLine();         Scanner input...
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments...
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT