Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

can you help me with the following :What is the purpose of malware? Follow-up by

ID: 3884017 • Letter: C

Question

can you help me with the following

:What is the purpose of malware? Follow-up by briefly describing each of the following types of malware: virus, spyware, adware, Trojans, worms, and macro virus. How can an organization provide a defense against attacks both logically and physically? Directions: Your completed assignment should be at least 2 FULL double-spaced page(s) in length. Proofread your completed essay to ensure proper spelling, grammar, capitalization, punctuation, and sentence structure. Include at least one Herzing library or appropriate web reference in addition to your text and/or supplemental material provided that is presented in proper APA format that supports your submission. (60 points) Assignment Objectives: 1. Discuss possible security issues within an organization. 2. Evaluate the different types of malicious software and what damage they can do. 3. Describe methods of protecting against malware attacks. 4. Define physical security attacks and vulnerabilities. • Week 2 Assignment 2 (W2A2): Key Assessment for Learning Objective #1 Use Internet search engines to gather information on U.S. Code, Title 18, Sec. 1030, which covers fraud and related activity in connection with computers. -- Write a one page summary explaining how this law can affect ethical hackers and security testers.

Task 1: The summary must mention at least one law and discuss

Task 2: Alexander Rocco Corporation, a large real estate management company in Maui, Hawaii, has contracted your computer consulting company to perform a penetration test on its computer network. The company owns property that houses a five-star hotel, golf courses, tennis courts, and restaurants. ClaudiaMae, the vice president, is your only contact at the company. To avoid undermining the tests you’re conducting, you won’t be introduced to any IT staff or employees. Claudia wants to determine what you can find out about the company’s network infrastructure, network topology, and any discovered vulnerabilities. Research the laws applying to the state where the company is located, and be sure to reference any federal laws that might apply to what you have been asked to do.without any assistance from her or company personnel. Research the laws applying to the state where the company is located, and be sure to reference any federal laws that might apply to what you have been asked to do. Based on this information, write a one-two page report outlining the steps you should take before beginning penetration tests of the Alexander Rocco Corporation.

Task 3: Statement of work must be included

Task 4: Verify any contractual agreements and Laws

Explanation / Answer

Malware is the shortened form of malicious software.Since 1980’s personal computer users have been annoyed with Malware.As the wild world wide use of broadband internet, the potential to make money with Malware has become unlimited.Many organisations have realised this and are taking the opportunity while the majority of end users are apparent to the risk.

Virus: A virus is a endemic program that attaches itself to another piece of software, and then reproduces itself when that software is run. Most often this is spread by sharing software or files between computers.

Spyware: This is used to collect personal information about the end user without knowing to them, such as credit card numbers, email addresses and web surfing habits for marketing purposes. Some side effects of spyware infection can be a changed homepage address, slowed internet performance, pop-up advertisements.

Adware: Adware is a word formed from combining Advertising and Software.Adware is advertising-supported software. These advertisements are often in the form of pop-ups and help making revenue for the software author. Adware is more annoying than harmful on its own, but often times Adware comes bundled with other unwanted software such as Spyware.

Trojan: software that one guesses was going to be one thing, but turns out to be something bad. Named for the fabled Trojan Horse that appeared to be a gift but in fact carried a dangerous payload.

Worms:Worms usually show up via email and instant messages, and often confine themselves their activities to what they can accomplish inside the application that moves them. They use a computer network to spread, relying on security failures on the target computer in order to access it, and delete data.

Macre viruses:These viruses are the ones that run inside specific applications that allow macro programs in order to extend the capabilities of a given software. Viruses that targeted Microsoft Office were widespread a few years back, though the threat of macro viruses has also declined in recent times as unsigned macros are automatically disabled in Office and are not allowed to run.

The protection against malware has two parts: Personal vigilance, and protective tools. One of the most popular ways to spread malware is by email, which may be disguised to look as if it is from a familiar company such as a bank, or a personal email from a friend.Personal vigilance is the first layer of protection against malware. Because business security is not perfect, even downloads from legitimate sites can sometimes have malware attached. Which means that even the most prudent user is at risk, unless you take additional measures.

No organization can do without antivirus and anti-spyware software. New threats are emerging all the time, so one should always download up-to-date definitions from your software provider. While nothing is a guarantee against infection, antivirus and anti-spyware software can go a long way towards helping protect your organization.Finally, using antivirus and anti-spyware software is only part of a comprehensive security plan.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote