Question

In: Computer Science

Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload...

Assignment task

Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following

Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  

Item 2: Virus/Malware details:

  1. Name of malware/virus
  2. When and where was this virus/malware first discovered?
  3. How prevalent is this virus/malware? Is it regionalized by geography or business sector? Is it worldwide? How many computers/victims has it claimed?
  4. What has been the impact of this particular virus/malware? Has it damaged computers/data? Has it caused the loss of revenue or reputation? Has it physically damaged anything?
  5. Description of the virus/malware:

What specifically does the virus/malware do? How does it infect targets? What does it do once it infects a host? Does it change registry settings, does it leave behind malicious code, etc...? Is it destructive? If so how?

Solutions

Expert Solution

Introduction

Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc.

History

The term malware was introduced by Yisrael Rada in 1990. Many of these early infectious programs were actually written as pranks or experiments, but hackers now use malware to steal business, financial, and personal information.

Threats like malware have been in existence for decades but they were referred to as computer viruses during this time.

I will choose to write about Keyloggers.

Virus / Malware details:-

Keyloggers

  1. The first keylogger was used by the Soviet Union in the 1970s to monitor IBM electric typewriters used at embassies based in Moscow. They used to record what was typed and send the information back to Soviet Intelligence via radio signals.
  2. Keyloggers are becoming very common nowadays and there is also a report that nearly about 50% of the malware does not harm they only collect your personal information.
  3. Keyloggers is one of the most dangerous cyber threats for online users. It is designed to covertly log everything a user types using the keyboard.
  4. The most dangerous part about keyloggers is they can silently steal and pass on your sensitive information to the cybercriminals.
  5. Mostly keyloggers only have the work of stealing information they don't damage anything they just steal and provide it to the cybercriminals.
  6. Detecting a keyloggers can range from being very easy to extremely difficult.
  7. Keyloggers can be installed through random infections or through direct access to your device.
  8. The best way to detect and prevent keyloggers is by using a combination of strong anti-logger and anti-rootkit software .

Related Solutions

Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload...
Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?   Item 2: Virus/Malware details: Name of malware/virus When and where was...
Use your favorite search engine and search for “world’s greatest data breaches and hacks.” Scan through...
Use your favorite search engine and search for “world’s greatest data breaches and hacks.” Scan through the hits until you find visual diagrams or a text-based list of major data breaches that have occurred recently. (Major data breaches are defined as those in excess of 30,000 records.) Select and carefully review at least two of these data breaches. Briefly describe the two data breaches you selected. Explain in layman’s terms how you think these breaches occurred. Discuss whether or not...
use your favorite search engine to find the IRS' website ans locate Publication 537:"Installment Sales." after...
use your favorite search engine to find the IRS' website ans locate Publication 537:"Installment Sales." after reviewing that publication, answer the following questions: 1) which form is used to report an installment sale? 2)what are the requirements to report a sale on the installment basis for tax purposes? 3)If the taxpayer receives money over several periods, why would a taxpayer want to report a sale on the installment basis, rather than in the tax period when the sale oringinated? 4)...
  Why do you think Google dominates as a search engine?  What's your favorite search engine and why...
  Why do you think Google dominates as a search engine?  What's your favorite search engine and why -- or do you not prefer one over the other?  What do you think makes a good search engine?  Can you think of any features that search engines could potentially add? answer in 1-2 paragraphs
Conduct a web search on "The best and worst PowerPoint presentations" using your favorite search engine......
Conduct a web search on "The best and worst PowerPoint presentations" using your favorite search engine... which is google. give two reasons why this website was your choice of either the best or worst PowerPoint presentation and discuss what should or should not be done when creating a PowerPoint presentation. At the end of the oaragraph put the URL of the website.
Using your favorite search engine, look up and compare the global manufacturing footprints of Apple and...
Using your favorite search engine, look up and compare the global manufacturing footprints of Apple and Toyota. Why do their networks look the way they do? Specifically, compare and contrast the number and location of manufacturing facilities each has worldwide. Identify and discuss the potential drivers that led decision makers to develop these global networks
Using your favorite search engine, research the mission and vision statements of different fortune 500 companies....
Using your favorite search engine, research the mission and vision statements of different fortune 500 companies. Then, you will response must be 750 words in which you compare and contrast the mission statements of two companies and the vision statements of two companies. You may use the same companies for both the mission and vision comparisons or separate companies.
Using your favorite search engine, conduct research on a well-known leader of a corporation. You might...
Using your favorite search engine, conduct research on a well-known leader of a corporation. You might be interested in researching formers leaders such as Lee Iacocca of Chrysler, Herb Kelleher of Southwest Airlines, Jack Welch of General Electric, or Ray Kroc of McDonald's. Alternatively, you could research present-day corporate leaders such as Indra Nooyi of PepsiCo, Mary Barra of GM, Mark Zuckerberg of Facebook, Gregory Hayes of United Technologies, etc. Remember, the leader you choose to research doesn't have to...
3. Using your favorite search engine, research the Global Competitiveness report (from the World Economic forum)...
3. Using your favorite search engine, research the Global Competitiveness report (from the World Economic forum) and the World competitiveness Ranking (from the IMD World Competitiveness Center). Identify and discuss the main factors used to create each ranking. Which method and result do you trust more? Why? 4. Using information from the Global Competitiveness report, prepare a memo discussing the strengths and weakness of location facilities in any two South American countries. Pick one for establishing a manufacturing beachhead and...
(1) Use a search engine to find two different online data markets. Write a report sharing...
(1) Use a search engine to find two different online data markets. Write a report sharing the sources or focus of information each provides, the availability of visualization tools to preview data, and how developers can access or incorporate the data into their and websites.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT