Preview

Lab 2

Good Essays
Open Document
Open Document
639 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2
Lawrence Joy
Pengda Jin
Jing Shang
Hanish Mandru
1. What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms?
a. The various types of malware are viruses, worms, Trojan horses, polymorphic threats, virus and worm hoaxes, back door or trap door, denial­of­service and distributed denial­of­service, and mail bomb.
b. A virus must be executed such as opening an infected email attachment while a worm can be initiated with or without the user downloading or executing the file. c. A Trojan horse carries neither a virus or worm. 2. Why does polymorphism cause greater concern than traditional malware? How does it affect detection? A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self­encrypted virus designed to avoid detection by a scanner.
Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.
Polymorphism, in computing terms, means that a single definition can be used with varying amounts of data. In order for scanners to detect this type of virus, brute­force programs must be written to combat and detect the polymorphic virus with novel variant configurations. a polymorphic virus might have a virus decryption routine
(VDR) and an encrypted virus program body (EVB). When an infected application launches, the VDR decrypts the encrypted virus body back to its original form so the virus can perform its intended function. Once executed, the virus is re­encrypted and added to another vulnerable host application. Because the virus body is not altered, it provides a kind of complex signature that can be detected by sophisticated antivirus programs. 3. What is the most common violation of intellectual property? How does an organization protect against it? What agencies fight it?
The most common violation of intellectual property is theft, which is illegal taking of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 2

    • 310 Words
    • 2 Pages

    Question 1: What is the name of the computer you are working from? The Name of the computer is W2K8xx…

    • 310 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | The common cold occurs regularly in the United States. The occurrence of this disease is best described as…

    • 4132 Words
    • 17 Pages
    Good Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    lab 1

    • 627 Words
    • 6 Pages

    18. Take a screen shot of the Add or Remove Snap-ins dialog box, showing the two…

    • 627 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 514 Words
    • 2 Pages

    2. Create a user account named Kim in the Sales OU by using the following command:…

    • 514 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    It places the virus in a Virus Vault which is a quarantine area where all removed files, viruses go.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab2

    • 520 Words
    • 3 Pages

    On your own and without assistance, complete this Lab 2 Answer Form electronically and submit it via the Assignments Folder by the date listed on your Course Schedule (under Syllabus).…

    • 520 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Module 4 Blank Study Guide

    • 2907 Words
    • 12 Pages

    1. How does the spreading of a computer virus compare to the spreading of human viruses?…

    • 2907 Words
    • 12 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    4. Tiny pieces of programming code that install themselves on an infected computer called a Zombie and transmit data back to the hackers’ computer without awareness of the Zombie computer user…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    lab 1

    • 1137 Words
    • 7 Pages

    I know I haven’t passed the lab 1 H and B but I really do not want to lose points again just for the fact I didn’t get it done in time. I already lost -5 pts and I really don’t want to lose -20 pts.…

    • 1137 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays

Related Topics