Question

In: Computer Science

Research a virus or malware that spreads via the network once it has infected a computer. Items to note are the following:

Research a virus or malware that spreads via the network once it has infected a computer. Items to note are the following:

Name of the infection?

How does it infect the original host?

Is their a fix for the infection, ie Critical Security Update?

What process does it hijack on the computer

How does it spread from the original host?

What damage can it do over the network?

How can an administrator stop the spread of the infection?

Solutions

Expert Solution

Viruses are infectious programs that are sent from one computer to another computer and in turn infect a lot of computers in the network, to be taken control and to leak information and data by the attacker. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments.

Items to note are the following:

Name of the infection? - WannaCry ransomware

How does it infect the original host? - The ransomware is spread by taking advantage of a Windows vulnerability that Microsoft (MSFT) released a security patch for in March.

Is their a fix for the infection, ie Critical Security Update? -

What process does it hijack on the computer? - Microsoft has taken the process of releasing patch for computers running older operating systems including Windows XP, Windows 8 and Windows Server 2003 and also newer OS to counter the hijack.

How does it spread from the original host? - As said earlier it works on a security vulnerability and takes advantage of a Windows vulnerability.

What damage can it do over the network? - Affected machine have to pay a ransom to get access and control over their own computers and data as the ransomware blocks everything on the computer. The ransomware can spread over networks through files and emails and can infect other computers easily.

How can an administrator stop the spread of the infection? - The administrator can have a in place well antivirus software and firewall to fight and have security against the virus. Also the security patch from Microsoft has to be installed.


Related Solutions

Conduct some research and find a recent computer virus that has attacked either a company or...
Conduct some research and find a recent computer virus that has attacked either a company or individuals. Explain how the virus effects computers or networks and how to stop the virus.
A diagnostic test is being developed to diagnose a new virus that has infected 10% of...
A diagnostic test is being developed to diagnose a new virus that has infected 10% of the world's population. If a person is infected with the virus, the probability that the diagnostic test comes back positive is 0.9 and if a person is not infected with the virus, the probability that the diagnostic test comes back positive is 0.25. Suppose a randomly seleted person is given the diagnostic test. Given that the test came back negative, find the probability that...
You are studying the source of a new virus that has recently infected humans. You suspect...
You are studying the source of a new virus that has recently infected humans. You suspect that the virus was transferred from oter primates (they exhibit a similar infection), specifically chimpanzees, gorillas, or orangutans. You sample blood from several infected humans and sequence some viral genes. You then build a phylogenetic tree with the human sequences and all the known strains from each primate. Draw a hypothetical phylogenetic tree that would suggest that the virus came from gorillas, and this...
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a...
Suppose we need to connect Computer Network Research Lab (CNRL) network with address 167.89.0.0 through a router to the EE Department network with address 123.0.0.0 and connect CNRL network through a router to the EE Research network with address 222.22.2.0 . Please draw a diagram for this network connection. Choose IP addresses for each interface of each router and show several hosts on each network, with their IP addresses. Please briefly explain each step.
Once an individual has been infected with a certain disease, let X represent the time (days)...
Once an individual has been infected with a certain disease, let X represent the time (days) that elapses before the individual becomes infectious. An article proposes a Weibull distribution with α = 2.6, β = 1.1, and γ = 0.5. [Hint: The two-parameter Weibull distribution can be generalized by introducing a third parameter γ, called a threshold or location parameter: replace x in the equation below, f(x; α, β) = α βα xα − 1e−(x/β)α x ≥ 0 0 x...
Once an individual has been infected with a certain disease, let X represent the time (days)...
Once an individual has been infected with a certain disease, let X represent the time (days) that elapses before the individual becomes infectious. The article “The Probability of Containment for Multitype Branching Process Models for Emerging Epidemics” (J. of Applied Probability, 2011: 173-188) proposes a Weibull distribution with alpha = 2.2, beta = 1.1, and gamma = 0.5 a. Calculate P(1 < X < 2). b. Calculate P(X > 1.5). c. What is the 90th percentile of the distribution? d....
Could ELISA be used to determine if someone has been previously infected with SARS-CoV-2( the virus...
Could ELISA be used to determine if someone has been previously infected with SARS-CoV-2( the virus that causes COVID-19 diseas)? Explain.
Essay: How has the corona virus infected you? On a 1 1/2 to 2 page paper.
Essay: How has the corona virus infected you? On a 1 1/2 to 2 page paper.
Computer dynamics is a microcomputer software development company that has a 300-computer network. The company is...
Computer dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park with about 100 computers in each building. The LANs in each building are similar, but one building has the data center in the second floor. There are no other office locations. Please refer to the network architecture components in Figure 6-1 of the textbook, and identify the key network architecture components in the design...
1. Once a + strand RNA virus has released its genome into a cell, describe the...
1. Once a + strand RNA virus has released its genome into a cell, describe the synthesis stage (ONLY) of the virus replicative cycle. 2. Describe the absorption phase of an enveloped RNA virus. 3. How does Acyclovir and its various forms relieve the symptoms of herpes? 4. Contrast mumps infection in children versus an adult male. 5. How do AZT and other nucleotide analogs control the AIDS virus? How do protease inhibitors work? 6. Describe the structure and functions...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT