Question

Name and describe the five main categories of malicious software identified in Section 10.1 of the...

Name and describe the five main categories of malicious software identified in Section 10.1 of the text.

Provide an example of each that differs from the example provided in the text.

Rank these categories from most dangerous to least dangerous, and provide a rationale for your ranking.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Here are the 5 most dangerous malicious software that are available in the internet and can bring huge damage to your infrastructure. On the basic of the damage they bring to the infrastructure, they are ranked in the below ways:

  1. Ransomware: This is the most dangerous malware present in the internet as it will be injected into the infrastructure and the malicious software will keep on deleting the important data from the infrastructure and even difficult to detect. So, the attacker demands ransom in order to delete the data from the infrastructure.
  2. Viruses: This is another type of malware that also bring severe damage to the infrastructure. The main speciality of these viruses is that they can multiply themselves easily and corrupt the files present in that infrastructure.
  3. Trojan: This is another dangerous malicious software which can easily be transferred from one machine to another and this is very difficult to delete. Trojan will collect all the important information present in the infrastructure and send that data to the attacker.
  4. SQL injection: This malware is mostly effective against a database. Here the attacker will inject this malicious code into your database and this malicious query will run in your database that can delete, modify or alter the important data present in your database and can easily bring your application down.
  5. DDOS attack: This is the lowest ranked malware that is used by attacker to bring the infrastructure down. Here the attacker will flood the application with traffic and thus bring the application down. This is least dangerous.
Add a comment
Know the answer?
Add Answer to:
Name and describe the five main categories of malicious software identified in Section 10.1 of the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • An article in Information Security Technical Report ["Malicious Software-Past, Present and Future" (2004, Vol. 9, pp....

    An article in Information Security Technical Report ["Malicious Software-Past, Present and Future" (2004, Vol. 9, pp. 6-18)] provided the following data on the top ten malicious software instances for 2002. The clear leader in the number of registered incidences for the year 2002 was the Internet worm "Klez," and it is still one of the most widespread threats. This virus was first detected on 26 October 2001, and it has held the top spot among malicious software for the longest...

  • Describe the characteristics of each software development model: V-model, waterfall and iterative models/frameworks and the key...

    Describe the characteristics of each software development model: V-model, waterfall and iterative models/frameworks and the key development stages or phases of each. Identify the key test levels with each model and the main goal(s) of each level. Incorporate details from section 2.2 into your analysis. Identify the pros and cons of each model. Identify how testing responsibilities and the role of the tester changes across the various development stages or phases. Provide an overview of how each model compares and...

  • You have been given a stipend to expand your “troubleshooting tool kit” by adding three additional...

    You have been given a stipend to expand your “troubleshooting tool kit” by adding three additional utility software tools to aid in your work. After researching your options, which tools would you choose? In your response, name and describe three specific utility software tools not described in the textbook that you believe would most improve your ability to render general, but effective, user support. If possible, choose tools from at least two of the categories described in the “Categories of...

  • Trait Theories ·        Summarize the main points of the theory in your own words . ·       ...

    Trait Theories ·        Summarize the main points of the theory in your own words . ·        Provide an example where you witnessed the theory in practice or suggest a situation where it could be applicable in the Practice Example column. Do not restate the Application to Practice column in the textbook; provide a unique example or suggest a possible scenario. ·        Correlate at least one of Gardner’s task to the theory and practice example. Use at least five in-text citations...

  • Describe the five characteristics of life, and list several nonliving things that possess at least two...

    Describe the five characteristics of life, and list several nonliving things that possess at least two of these characteristics. Explain how an atom relates to the biosphere by describing the levels of organization. Why is a cell, and not an atom or a molecule, considered the basic unit of life? Draw and explain the relationship between producers and consumers (including decomposers). How does a homes’ air conditioning system illustrate homeostasis? Describe the main differences between asexual and sexual reproduction. Why...

  • 23. Describe the two categories of long-term memory and their subtypes (there are five). Discuss the brain regions involved in each, and provide a real-world example of three of them from your own li...

    23. Describe the two categories of long-term memory and their subtypes (there are five). Discuss the brain regions involved in each, and provide a real-world example of three of them from your own life. (As a reminder, you can find a discussion of these types of memory in the Video Learning and Memory: Basic distinctions 2 at about 25 minutes). 24. Describe what happens when you damage the brain, and discuss why the nervous system has a difficult time repairing...

  • 1. A. Name the three planes and the positions they each describe to identify a unique...

    1. A. Name the three planes and the positions they each describe to identify a unique position in the human body. B. Name the two major ventral body cavities plus the major organs found in them. C. Name the cavities that the heart and lungs reside in. D. Finally, list the six levels of organization in nature. 2. A. Describe the three components of an atom in terms of charge and location. Define atomic mass and atomic number. B. For...

  • PART B: Five Short Answer Questions (25 marks) (Each question is worth 5 marks. Answer the...

    PART B: Five Short Answer Questions (25 marks) (Each question is worth 5 marks. Answer the questions in the Answer booklet provided.) Why is chain of custody important? What happens when a chain of custody is broken? Outline the basic steps when planning a digital forensics investigation [1+1+3 Marks] 1. Discuss two acquisition methods in digital forensics. Your answer should include scenarios and tools used in each acquisition method. [2+3 marks] 2 Why is validation important? What is data hiding?...

  • Below is my case study, I have already answered the first two questions but need help...

    Below is my case study, I have already answered the first two questions but need help with the last two. Denzel Armstrong Case Study Welcome to Dr. Jones’s busy general practice clinic where he sees patients of varying ages. You are one of three RNs in the clinic and your general duties include assessment, patient education, assistance with minor dressing changes, obtaining routine labs (i.e. urine, blood etc.) to name just a few. You have been a nurse for five...

  • Name Check Your Understanding 6.1 Section Date 1 What are some reasons why skeletons vary from...

    Name Check Your Understanding 6.1 Section Date 1 What are some reasons why skeletons vary from one another? 2 What are the five main functions of the skeleton? Briefly explain each. 3 What are some kinds of information that can be obtained from a skeleton? 4 What are the two main "portions" of the skeleton? Circle the answer that refers to the one that develops first. 5 What are the two main types of bone tissue? 6 What imaginary plane...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT