Question

In: Computer Science

1)exlplain in short what does network security means 2) what is computer viruses? 3) how does...

1)exlplain in short what does network security means 2) what is computer viruses?
3) how does computer virus spread?
4) What is a worm?
5) How does worms spread?
6)Detailed difference between viruses and worms?
7) What is the use of viruses and worms in network security and who uses them?
8)How to prevent virus and worm infection?

Solutions

Expert Solution

1. Network security can be defined as the protection of networks and computer system from malicious attacks like execution of viruses, worms, trojans with the intent to destroy the system and its secured features.

2. Computer viruses is malware which stands for malicious software used to disrupt computer operations, gather sensitive information, gain access to private computer systems. They replicates by attaching to hosts and often evade detection by self modification.

3. They replicates by attaching to hosts and often evade detection by self modification. In this way viruses spread over a system.

4. Worm is another type of malware which is a program or algorithm that replicates itself over a computer network. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

5. They spread over computer network. They use parts of an operating system that are automatic and usually invisible to the user.

6. The virus replicates by attaching to hosts whereas worms replicate itself over a computer network.

The virus often evade detection by self-modification, which defeats signature scanners, because each infected file contains a different variant of the virus whereas worms usually perform malicious actions such as using up the resources of the computer and possibly shutting the system down. They use parts of operating systems that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

7. Viruses and worms are used to infect the system for seeking profit, or desire to send a political message, to demonstrate that vulnerability exists in software, for sabotage or for cybersecurity issues and evolutionary algorithms. They can gain admin control and steal sensitive data.

Social engineers or hackers or virus writers may use them.

8. Using good antivirus or malicious software removal tools can be an option. Having a Hardware-based firewall and deploy DNS can be a method of prevention. Other than that any third party installation should be checked and system securities should be properly taken care of.


Related Solutions

What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
1. How does malware infect a computer? 2. How does malware spread? 3. How does the...
1. How does malware infect a computer? 2. How does malware spread? 3. How does the malware works? 4. Is virus and malware the same? 5. How do I manually remove malware? 6. What's an example of malware? 7. What is malware attack? 8. What is Worm malware? 9. What do computer viruses do? 10. How do I protect my computer from malware? 11. What is the best anti malware? 12. What is worm, a virus, and a Trojan horse?
Network security question: what is dns? how does it work? identify the attack surface of dns....
Network security question: what is dns? how does it work? identify the attack surface of dns. clearly detail how the exploitable services of dns can be attacked
What role does password expiration play in computer security?
What role does password expiration play in computer security? Briefly explain a major advantage of password expiration, and briefly explain a major disadvantage.
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
1. How does NAC play a role in centralized PC security management? 2. What is the...
1. How does NAC play a role in centralized PC security management? 2. What is the role of restoration order in recovering data from backups?
a) explain what the law of diminishing(marginal) return means. Does it apply to the short or...
a) explain what the law of diminishing(marginal) return means. Does it apply to the short or long run? Is it only present in perfectly competitive markets? b) how does a firm operating under perfect competition know when it is maximizing its profit-in other words, what is the rule that it follows? explain in detail c) is the decision that the firm makes in part b a short or long run decision? why? explain the difference between the short and the...
1. What is a short sale and why does it occur? 2. What was the Obama...
1. What is a short sale and why does it occur? 2. What was the Obama stimulus package and what was its purpose?
Slappey Communications is a technology firm in Birmingham, Alabama, specializing in telecommunications, computer, and network security....
Slappey Communications is a technology firm in Birmingham, Alabama, specializing in telecommunications, computer, and network security. Its owner, Bill Slappey, invested nearly $770,000 in property, plant, and equipment for the business in 2014 (See “Small Firms Poised to Spend More on Plants, Equipment,” A. Loten and V. Monga, Wall Street Journal, September 3, 2014.) Slappey spent about $100,000 to build a 1,000-square-foot “cloud storage” room, or a warehouse for network servers. Slappey also spent about $670,000 on computers, servers, and...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT