Question

In: Computer Science

Malware and Virus 1. Explain two of the attacks and set a real scenario? 2. How...

Malware and Virus
1. Explain two of the attacks and set a real scenario?
2. How can you protect your network against these attacks?

Solutions

Expert Solution

I Virus is a program which enters into your system via network and replicates itself and damages your files and system contents. Malware is bigger term used for Virus,Worm and Trojans together. A Virus attaches itself to a systems files and content it is activated only when it is executed by the user.

1) There are multiple types of computer virus, Boot Sector Virus, Webscripting virus, Browser hijacker etc.

a)A boot sector virus can come via a usb drive and take control of your system when it starts it can cause system slowdown, multiple popup windows or corruption of system files.

b) A webscripting virus can enter in your system when you visit malicious websites. A webscripting virus can take control of your browser and redirect you to certain pages automatically

2) To protect against virus , A Network Firewall and Anti-virus can be used.

A) A Network firewall blocks all the malicious websites to be opened on the system and it acts more of a prevention step for virus protection

B) An Anti-virus scans the system for virus and removes them from the system. Anti-Virus works better when your system is already having computer virus


Related Solutions

1. Explain Malware and viruses ? 2. Explain two of the attacks and give a real...
1. Explain Malware and viruses ? 2. Explain two of the attacks and give a real scenario ? 3. How can you defend your network from these attacks?
What happens to your body when a virus attacks the lungs and heart? 1. Explain the...
What happens to your body when a virus attacks the lungs and heart? 1. Explain the science in your own words as if you are describing it to someone with no scientific knowledge (make sure you use appropriate words). 1. Don’t focus on coronavirus because it might be difficult.
1. How does malware infect a computer? 2. How does malware spread? 3. How does the...
1. How does malware infect a computer? 2. How does malware spread? 3. How does the malware works? 4. Is virus and malware the same? 5. How do I manually remove malware? 6. What's an example of malware? 7. What is malware attack? 8. What is Worm malware? 9. What do computer viruses do? 10. How do I protect my computer from malware? 11. What is the best anti malware? 12. What is worm, a virus, and a Trojan horse?
Explain how you can utilize plant physiology in a real world scenario
Explain how you can utilize plant physiology in a real world scenario
3. Name two types of common attacks on security and explain how we can test them.
3. Name two types of common attacks on security and explain how we can test them.
1. What is break-even analysis and how is it used? 2. Explain the meaning of "real...
1. What is break-even analysis and how is it used? 2. Explain the meaning of "real options." What are some of the real options associated with capital budgeting projects? Provide 2-3 and explain.
1. Explain how an ELISA can be used to detect SARS-CoV-2 (the virus that causes COVID-19)...
1. Explain how an ELISA can be used to detect SARS-CoV-2 (the virus that causes COVID-19) and the steps involved. 2. An ELISA would be ineffective for detecting SARS-CoV-2 during early symptomatic infection because the antibodies take a long time to form. True False
1. Explain how an ELISA can be used to detect SARS-CoV-2 (the virus that causes COVID-19)...
1. Explain how an ELISA can be used to detect SARS-CoV-2 (the virus that causes COVID-19) and the steps involved. 2. An ELISA would be ineffective for detecting SARS-CoV-2 during early symptomatic infection because the antibodies take a long time to form. True False
1. Explain prospect theory. Give 1 real-life example to illustrate how the theory works. 2. Explain...
1. Explain prospect theory. Give 1 real-life example to illustrate how the theory works. 2. Explain how organizations conduct capability analysis when developing a new product. Give 1 example to illustrate your answer. 3. Discuss the customer adoption model of new products. Give 1 example to illustrate your answer. 4. Discuss the design spectrum; give an example to illustrate your answer.
Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload...
Assignment task Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?   Item 2: Virus/Malware details: Name of malware/virus When and where was...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT