Computer Security

1 Oct No Comments

Computer Security

Name

School

Instructor

Date

Computer Security

A worm is a malware that is capable of replicating itself. It is a program that penetrates an operating system with an intention of spreading malicious code. Malware works by replicating itself and utilizing networks to spread its replica to other computers according to (Barnard, 2010). They cause harm by consuming the bandwidth, deleting files or even sending documents via email. Worms can also install backdoors for hackers to use as a channel to hack the system. It is worth noting that there is a difference between a worm and a virus though normally confused. A worm doesn’t need to embed itself to a program to perform its malicious functions and also replicates itself unlike a virus. It also doesn’t need remote intervention of a cyber-criminal.

  • Explain what a worm is and how it functions. (75 Words)

False authority syndrome is when someone thinks they know more about a particular subject or when people think someone knows more about some particular field since they have knowledge of a field related to that. A good example is when someone thinks they know more about computer malware since they have knowledge in a related field like computer science or IT (Aycock, 2006).). This is very risky and dangerous since someone can be assignment a task they barely know and will not perform as required. A case where someone is assigned as a web security personnel in an IT company since they have only knowledge in IT is very risky.

  • What is false authority syndrome, and what risks does it pose? (75 Words)

A pseudo virus expert is someone who thinks they have knowledge about computer malware and specifically viruses. This normally happens in many situations where someone studied IT or computer science and have had to deal with some viruses. This creates a false impression that they are virus experts. This is wrong since they do not have the full knowledge in that field as they allege to (Bradley, & Carvey, 2006). This could be risky if someone is tasked with a responsibility of being in charge of such. They might not fully be aware of what they are handling. They will definitely be overpowered when some sophisticated malicious virus are encountered.

  • What is a pseudo virus expert? (75 Words)

Adware is a software that downloads and displays advertisements automatically and normally not initiated by the user. An example of this is those that display similes and emoticon in emails. A spyware is a software that gathers user’s information and sends them so someone else without the users knowledge. They normally also referred to as spying software or spybot. The information gathered could be relayed to an advertiser or any other interested party. An example of this is Keyloggers like SpyAnytime which works by detecting user’s activity like networks traffic, users log in details like passwords and usernames etc. The main difference between them is that adware basically targets at displaying advertisements to the user while spyware spies on the user for their details and normally after attacking the user (Bradley & Carvey, 2006).

  • Define and distinguish adware and spyware. Give an example of each. (75 Words)

5.What is a DoS attack? How does it work? (75 Words)

DoS is an acronym for Denial Of service which is an attack designed for to bring down networks by flooding it with many useless generated traffic. This works by pinging it till the networks gives up when it can’t handle any more traffic and goes offline. An example of this is the Teardrop attack which exploits the limitations posed by TCP/IP protocols (Liu, 2011). These attacks are normally fatal since a server can give up many personal information to hackers and can give them to hackers and other cyber criminals. Once such attack happens, it affects a wide range of users.

References

Aycock, J. (2006). Computer viruses and malware. New York: Springer.

Barnard, C. (2010). Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration. Ft. Belvoir: Defense Technical Information Center.

Bradley, T., & Carvey, H. (2006). Essential computer security everyone’s guide to e-mail, internet, and wireless security. Rockland, MA: Syngress Pub.

Liu, L. (2011). Multi-level sandboxing techniques for execution-based stealthy malware detection.




Click following link to download this document

Computer Security.docx