Can somone help me answer this questions I will rate thank you :} Question Chapt
ID: 3672846 • Letter: C
Question
Can somone help me answer this questions I will rate thank you :}
Question Chapter 15/2: Explain the difference between different types of malware (i.e., worms, viruses, Trojans).
Question Chapter 15/3: What is/are the most dangerous form(s) of malware and why?
Question Chapter 15/4: Architect/design an attack involving at least multiple attack mechanisms (e.g., social engineering, spear fishing, viruses). For each attack element, list a few sentences on the scenario and projected outcome. What is the ultimate goal of the attack?
Question Chapter 2/2: In 8 sentences or less, describe the evolution of cyber attacks from the past 15 years or so. Describe both how the attacks and how the goals of attackers have changed. If you feel adventuresome, add another 2 sentences to what you think cyber attacks will be in the next 5 – 10 years.
Explanation / Answer
15/2) A virus is a program which can copy itself and infect a PC by spreading from one file to the other and then from one PC to some other when the infected files are copied or shared.
Most of the viruses attach themselves to some executable files while some may target an MBR, Microsoft Office macros, startup scripts etc.
Trojan horses are such programs that seem to do something useful but secretly executes malicious code which steals data. In most of the cases trojans will create a backdoor which allows the PC to be remotely controlled by the attacker. The primary difference between a virus and a trojan is that trojans do not replicate themselves but gets installed unknowingly.
Computer worms are the programs that use the network to send copies of themselves to some other PCs by normally utilizing a security hole to travel from one host to the another often automatically.
15/3) The most dangerous forms of malware is the trojan horse. Trojans are created containing the purpose to discovering personal/financial information, controlling the computer’s system resources, and in larger systems to create a denial-of-service (DOS) attack which is an attempt to make a machine or network resource unavailable to those trying to reach it. For e.g. yahoo or any business, network becoming unavailable.
15/4) Social engineering: Suppose a clone of a reputed bank's website has been made. Whenever a person logs into that site the attacker would gain the authentication details of the user and exploit it.
Spear-fishing: Suppose a user receives an email that seems to be arriving from an individual or business that he/she knows but it isn't actually. It's from the a criminal hacker who can gather your credit card and bank account numbers, passwords from your PC.
2/2) In 1989, Robert Morris created what the first computer worm.
The first viruses Melissa and ILOVEYOU, during 1990s infected tens of millions of PCs by causing email systems around the globe to fail.
Credit Cards went Under Attack during Late 2000s.
Next came the Target Breach and the Threat Tsunami that resides in today's world.
Nowadays cybercrime is so much sophisticated that it seems almost impossible to prevent. The goal is now on how does an organization responds to it once the security has been breached. Thus we can develop organizational flexibility such that these incidents are wisely handled as just another part of the business.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.