Question

In: Computer Science

Research a virus or malware that spreads via the network once it has infected a computer. Items to note are the following:

Research a virus or malware that spreads via the network once it has infected a computer. Items to note are the following:

Name of the infection?

How does it infect the original host?

Is their a fix for the infection, ie Critical Security Update?

What process does it hijack on the computer

How does it spread from the original host?

What damage can it do over the network?

How can an administrator stop the spread of the infection?

Solutions

Expert Solution

Viruses are infectious programs that are sent from one computer to another computer and in turn infect a lot of computers in the network, to be taken control and to leak information and data by the attacker. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.

Items to note are the following:

Name of the infection? - WannaCry ransomware

How does it infect the original host? - The ransomware is spread by taking advantage of a Windows vulnerability that Microsoft (MSFT) released a security patch for in March.

Is their a fix for the infection, ie Critical Security Update? -

What process does it hijack on the computer? - Microsoft has taken the process of releasing patch for computers running older operating systems including Windows XP, Windows 8 and Windows Server 2003 and also newer OS to counter the hijack.

How does it spread from the original host? - As said earlier it works on a security vulnerability and takes advantage of a Windows vulnerability.

What damage can it do over the network? - Affected machine have to pay a ransom to get access and control over their own computers and data as the ransomware blocks everything on the computer. The ransomware can spread over networks through files and emails and can infect other computers easily.

How can an administrator stop the spread of the infection? - The administrator can have a in place well antivirus software and firewall to fight and have security against the virus. Also the security patch from Microsoft has to be installed.


Related Solutions

A diagnostic test is being developed to diagnose a new virus that has infected 10% of...
A diagnostic test is being developed to diagnose a new virus that has infected 10% of the world's population. If a person is infected with the virus, the probability that the diagnostic test comes back positive is 0.9 and if a person is not infected with the virus, the probability that the diagnostic test comes back positive is 0.25. Suppose a randomly seleted person is given the diagnostic test. Given that the test came back negative, find the probability that...
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a...
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a router to the EE Department network with address 123.0.0.0 and connect CNRL network through a router to the EE Research network with address 222.22.2.0 . Please draw a diagram for this network connection. Choose IP addresses for each interface of each router and show several hosts on each network, with their IP addresses. Please briefly explain each step.
You are studying the source of a new virus that has recently infected humans. You suspect...
You are studying the source of a new virus that has recently infected humans. You suspect that the virus was transferred from oter primates (they exhibit a similar infection), specifically chimpanzees, gorillas, or orangutans. You sample blood from several infected humans and sequence some viral genes. You then build a phylogenetic tree with the human sequences and all the known strains from each primate. Draw a hypothetical phylogenetic tree that would suggest that the virus came from gorillas, and this...
Once an individual has been infected with a certain disease, let X represent the time (days)...
Once an individual has been infected with a certain disease, let X represent the time (days) that elapses before the individual becomes infectious. An article proposes a Weibull distribution with α = 2.6, β = 1.1, and γ = 0.5. [Hint: The two-parameter Weibull distribution can be generalized by introducing a third parameter γ, called a threshold or location parameter: replace x in the equation below, f(x; α, β) = α βα xα − 1e−(x/β)α x ≥ 0 0 x...
Once an individual has been infected with a certain disease, let X represent the time (days)...
Once an individual has been infected with a certain disease, let X represent the time (days) that elapses before the individual becomes infectious. The article “The Probability of Containment for Multitype Branching Process Models for Emerging Epidemics” (J. of Applied Probability, 2011: 173-188) proposes a Weibull distribution with alpha = 2.2, beta = 1.1, and gamma = 0.5 a. Calculate P(1 < X < 2). b. Calculate P(X > 1.5). c. What is the 90th percentile of the distribution? d....
Could ELISA be used to determine if someone has been previously infected with SARS-CoV-2( the virus...
Could ELISA be used to determine if someone has been previously infected with SARS-CoV-2( the virus that causes COVID-19 diseas)? Explain.
Essay: How has the corona virus infected you? On a 1 1/2 to 2 page paper.
Essay: How has the corona virus infected you? On a 1 1/2 to 2 page paper.
1. Once a + strand RNA virus has released its genome into a cell, describe the...
1. Once a + strand RNA virus has released its genome into a cell, describe the synthesis stage (ONLY) of the virus replicative cycle. 2. Describe the absorption phase of an enveloped RNA virus. 3. How does Acyclovir and its various forms relieve the symptoms of herpes? 4. Contrast mumps infection in children versus an adult male. 5. How do AZT and other nucleotide analogs control the AIDS virus? How do protease inhibitors work? 6. Describe the structure and functions...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an...
1) Define the following concepts: computer network, network architecture, protocol, and multilayer protocol. 2) As an IT professional who works in the networked world describe the professional, social, economic, and cultural issues of computer networks. 3) As an IT professional who works in the networked world describe the ethical issues and your social responsibility.
Sarah has a craft shop that sells items online on Etsy. Once a year, in October,...
Sarah has a craft shop that sells items online on Etsy. Once a year, in October, she must plan for her special items sales for Valentine’s day. Her best seller for Valentine’s day is a heart-shaped keychain with the lovers’ names carved on it. Sarah does the carving right before shipping, but she must order all keychains from her supplier in October, to have them ready in January. She offers the keychain in her shop from January 15 to February...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT