Question

In: Computer Science

Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).

Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet).

Solutions

Expert Solution

Leading threats - A threat can be defined as an object, person, or other entity that represents a constant danger to an asset. Threats can attack, infect network and steal the data from computer system . leading threats are trying to find new ways to steal and harm data.

Virus - - A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Some viruses may cause only mildly effects while others can damage your hardware, software or files.

Virus signs:

System is hanging

Slower internet processing slower applications

Unusual messages

Sudden crashes

Pop ups

Strange activity and actions

Worm-- it is used to attack network. Worm is a program capable of replicating itself on a computer network. A worm also does not require a host as it is a self contained program. They generally travel from one computer to another across communication links on a network. Worms almost cause atleast some harm to the network whereas viruses almost always corrupt or modify files on a targeted computer.

Trojan horses - - it is a type of malware design to provide unauthorised remote access to a user's computer. They are fake softwares to infect the system.trojans leave the computer system unprotected.

When run, appears to do something useful but will also secretly perform hidden actions.

Rootkits-- Rootkit is a piece of malware that is installed by a hacker that gives them complete control of your computer system. This is nearly undetectable malware. Rootkit is a type of malware which can harm not only your software but also hardware.

Types of rootkits--

Hardware rootkit - it can hide itself in hardware of computer. it can also harm router and it can read data of harddisk

Boot loading - when u start your system, it can replaces or modify the boot loader with another one. They are serious threads because they can be used to hack passwords.

Memory rootkit--these rootkits exist in your computer's memory( RAM). this can stay for years without your knowledge.

Application level rootkit - it changes standard application files with rootkit files inside the computer.

Kernel rootkit - they are created for replacing portions of the code in Kernel. Kernel is the core of Computer. Kernel rootkit targets the kernel of Computer system.

Software engineering - - it is defined as systemic, disciplined and quantifiable approach. For the development operation and maintenance of software. Software that can run efficiently on real time machine. Software engineering is the process to design, build and analyze objects by using knowledge and principles in a systematic way.

Characteristics of software - -

1.software is developed or engineered. it is not manufactured.

2. Softwares does not ware out.

3.software is custom built.

Botnet - -it is a collection of bots remotely controlled and working together to perform tasks. it can harm computer system. It can steal your data. (Botnet = robot +network) A botnet is a large number of compromised computers that are used to generate spam, relay viruses or flood a network or web server with excessive requests to cause it to fail.


Related Solutions

Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet). Describe the malware detection...
Describe leading threats (Virus, Worm, Trojan Horses, Rootkits, Social Engineering, and Botnet). Describe the malware detection symptoms. Describe defense in depth.
Describe what a social engineering attack is. [Social engineering is the art of manipulating people so...
Describe what a social engineering attack is. [Social engineering is the art of manipulating people so they give up confidential information. The attackers solicits information such as passwords or PIN numbers from victims.] Provide 3 examples of social engineering attacks and describe how they could be used to undermine the security of your IT infrastructure. [ your answer goes here ] How can social engineering attacks be defended against? Provide 5 examples with descriptions. [ your answer goes here ]
For the new virus SARS-Cov-2, carefully describe the steps leading to the initiation of a primary...
For the new virus SARS-Cov-2, carefully describe the steps leading to the initiation of a primary adaptive immune response upon infection and the effector mechanisms produced to clear the infection in terms of receptors and effector molecules specific to the type of pathogen.
Describe the role of HR in supporting (and/or leading) positive social change within an organization, as...
Describe the role of HR in supporting (and/or leading) positive social change within an organization, as well as the impact of those efforts on an organization’s workforce, organizational culture, and surrounding community. In your response, include at least three examples of positive social change that you have read about or experienced within an organization.
Describe a strategy for how you would make a vaccine against a virus using genetic engineering...
Describe a strategy for how you would make a vaccine against a virus using genetic engineering and protein expression and purification system (i.e. from gene cloning to protein purification).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT