Question

In: Computer Science

1. What is cybercrime? What are some examples of it? 2. What is malware? Describe and...

1. What is cybercrime? What are some examples of it?
2. What is malware? Describe and differentiate between viruses, worms, Trojan horses, logic bombs, time bombs, spyware, etc.
3. What are security patches and antivirus software? How do they fit in to modern methods of combatting malware?
4. What are hacking, Webjacking, and DoS attacks?

The essay should be at least 300 words and not copied, the words should be self written.

Solutions

Expert Solution

Please find my answer for Q2.

Please repost other questions in separate post.

Virus: Small pieces of software that attach themselves to real programs.

The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability.
A true virus can spread from one computer to another (in some form of executable code).
Viruses can increase their chances of spreading on to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Viruses always mostly corrupt or modify system files on the targeted computer.
Worm: A self-replicating program

The major difference between a virus and a worm is that worm does not attach itself to other existing program as viruses do .
Worms spread across networks due to poor security of the infected computers.
Asthis type of infection runs by itself it can have devastating impacts.
Worm Viruses Include: lovgate.F, sobig.D ,trile. C
Trojan Horses: Allow the hackers to gain remote access of a target system.

Once a Trojan horse has been installed on a target computer system, the hacker can access it remotely and perform various operations.
Trojans can illegally trace important login details of users online
E-Banking is very common among users, therefore, vulnerability of tracing user’s login details, if the system is infected with Trojan Horse

Malware: stands for malicious software

Malware is a broad term that refers to a variety of malicious programs.
Software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.
Adware: Advertisement-supported software

They are generally spread through download of a software from an untrusted source from Internet
It is any software package that automatically delivers advertisements
Common examples of adware include pop-up ads on websites and advertisements that are displayed by software. Often times software and applications offer “free” versions that come bundled with adware.
Spyware: The spy inside your PC

It is program that is put in someone’s computer to secretly gather information about the user and relay it to advertisers or other interested parties.
Spyware can get in a computer as a software virus or as a result of installing a new program.

Ransomware holds a computer system, or the data it contains, hostage against its user by demanding a ransom for its restoration.

It is considered a “scareware” as it forces users to pay a fee (or ransom) by scaring or intimidating them
Some ransomware encrypts files called “cryptolocker”.
Ransomware can be downloaded by the unwitty users through some websites. They may also arrive as a payload, either dropped or downloaded by other malware. Some ransomware are delivered as attachments to spammed email.
Shortcut virus: creates shortcut files everywhere in the pc, results in disk space consumption.

RootKit :Activated each time your system boots up.

Difficult to detect because they are activated before your system’s Operating System has completely booted up.
Email Virus: Virus spread via an email.

Such a virus hides in an email and the effect is seen when the recipient opens the mail.
Examples of email virus’s are the Melissa Virus, and the ILOVEYOU virus.
Browser Hijacker :Changes web browser’s home page and default search provider to a different one without user’s permission.

It infects certain browser functions especially in form of re-directing the user automatically to certain sites.
Browser Hijackers Include sojou.com, ask toolbar, Conduit search

Bots: Sophisticated types of crimeware.

They are similar to worms and Trojans
They perform a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.


Related Solutions

Cybercrime 1) What is Cybercrime? 2) Give an example of Cybercrime? 3) What do you do...
Cybercrime 1) What is Cybercrime? 2) Give an example of Cybercrime? 3) What do you do to protect yourself from Cybercrime? 4) What do you do if you come across an internet scam/crime? What do you do if you are a victim? or, You receive a scam e-mail. or, You come across a scam webpage. 5) Who do you report the crime too? Your internet provider? The organization that owns /operates the search engine? The local police? The FBI? (what...
What are some types of malware?
What are some types of malware?
1. What is cybercrime? Give a few example of cybercrime. 2. Identify international differences by examining...
1. What is cybercrime? Give a few example of cybercrime. 2. Identify international differences by examining international regulations on cybercrime, the perspectives of different countries and your own country. (The answer to this question will be at least "1" page) ................................................................................................ SECOND TOPİC: An Abuse Case Patricia is a 8 years old. Her father died two years ago. Her mother is remarried. Her stepfather Pit is an unemployed, alcoholic man with sexual problems and beat Patricia. And he doesn’t want...
Countering Cybercrime in Russia 1. State and briefly describe your above research topic. 2. Describe the...
Countering Cybercrime in Russia 1. State and briefly describe your above research topic. 2. Describe the specific source types that you think will be useful for your research. 3. To plan your search further, list 2 key concept terms derived from your research statement. For each key concept term, list 2 alternative search terms. Use at least one wildcard or truncation with your alternative search terms. Key Concept Term 1 Alt search term 1 Alt search term 2 Key Concept...
1) What is the process of financial planning ? 2) What are some examples of both...
1) What is the process of financial planning ? 2) What are some examples of both internal and external data items that are collected as part of the "understanding the client's personal and financial circumstances" or data gathering as part of the financial planning process ? 3) What are the three general schools of thought for counseling ? Discuss each of them. 4) Based on their premises, compare and contrast Traditional Finance from Behavioral Finance . 5) What may be...
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments...
1. What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?  
Perform research on cybercrime risks. Identify some typical cybercrime risks that you have identified based on...
Perform research on cybercrime risks. Identify some typical cybercrime risks that you have identified based on your internet research. Based on the information identified summarize your overall findings. Identify how the cybercrime risks that you researched could have been remediated by the company in which they were involved in. 200 words or more, please.
1. What are some examples of administrative departments? 2. What is a Headcount Forecast Algorithm and...
1. What are some examples of administrative departments? 2. What is a Headcount Forecast Algorithm and what is its primary use? 3. Why is historically information particularly useful in creating a General and Administrative Cost budget?
Describe the malware detection symptoms
Describe the malware detection symptoms
Specify case examples and discussion on cybercrime that has impacted companies/corporations and the outcome. What did...
Specify case examples and discussion on cybercrime that has impacted companies/corporations and the outcome. What did the company/corporation do to prevent itself from future incidents from occurring? Can you identify any incidents that were never released to the public until maybe at a later time or never until revealed?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT