Question

In: Computer Science

1)exlplain in short what does network security means 2) what is computer viruses? 3) how does...

1)exlplain in short what does network security means 2) what is computer viruses?
3) how does computer virus spread?
4) What is a worm?
5) How does worms spread?
6)Detailed difference between viruses and worms?
7) What is the use of viruses and worms in network security and who uses them?
8)How to prevent virus and worm infection?

Solutions

Expert Solution

1. Network security can be defined as the protection of networks and computer system from malicious attacks like execution of viruses, worms, trojans with the intent to destroy the system and its secured features.

2. Computer viruses is malware which stands for malicious software used to disrupt computer operations, gather sensitive information, gain access to private computer systems. They replicates by attaching to hosts and often evade detection by self modification.

3. They replicates by attaching to hosts and often evade detection by self modification. In this way viruses spread over a system.

4. Worm is another type of malware which is a program or algorithm that replicates itself over a computer network. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

5. They spread over computer network. They use parts of an operating system that are automatic and usually invisible to the user.

6. The virus replicates by attaching to hosts whereas worms replicate itself over a computer network.

The virus often evade detection by self-modification, which defeats signature scanners, because each infected file contains a different variant of the virus whereas worms usually perform malicious actions such as using up the resources of the computer and possibly shutting the system down. They use parts of operating systems that are automatic and usually invisible to the user. It is common for worms to be noticed only when their uncontrolled replication consumes system resources, slowing or halting other tasks.

7. Viruses and worms are used to infect the system for seeking profit, or desire to send a political message, to demonstrate that vulnerability exists in software, for sabotage or for cybersecurity issues and evolutionary algorithms. They can gain admin control and steal sensitive data.

Social engineers or hackers or virus writers may use them.

8. Using good antivirus or malicious software removal tools can be an option. Having a Hardware-based firewall and deploy DNS can be a method of prevention. Other than that any third party installation should be checked and system securities should be properly taken care of.


Related Solutions

What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
1. How does malware infect a computer? 2. How does malware spread? 3. How does the...
1. How does malware infect a computer? 2. How does malware spread? 3. How does the malware works? 4. Is virus and malware the same? 5. How do I manually remove malware? 6. What's an example of malware? 7. What is malware attack? 8. What is Worm malware? 9. What do computer viruses do? 10. How do I protect my computer from malware? 11. What is the best anti malware? 12. What is worm, a virus, and a Trojan horse?
What does the SDLC have to do with Computer Security?
What does the SDLC have to do with Computer Security?
1. What are the various types of malware? 2. How do worms differ from viruses? 3....
1. What are the various types of malware? 2. How do worms differ from viruses? 3. Do Trojan horses carry viruses or worms?
Network security question: what is dns? how does it work? identify the attack surface of dns....
Network security question: what is dns? how does it work? identify the attack surface of dns. clearly detail how the exploitable services of dns can be attacked
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
What role does password expiration play in computer security?
What role does password expiration play in computer security? Briefly explain a major advantage of password expiration, and briefly explain a major disadvantage.
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT