Question
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC " MALICIOUS SOFTWARE"

Q3 whay does propagation phase happens Before execution phase. Woh Mootto wie GT Aso Oy tuhat are the mechanisin By which a V
0 0
Add a comment Improve this question Transcribed image text
Answer #1

3) Actually virus in its lyfe cycle goes through 4 different stages which are Dormant,propagating,triggering and excution phase and are performed in same order respectively

In propagating phase, the virus replicate itself in another program on the disk so that it can effect the whole.

In exccution phase, the virus actually perform its function and destroy file on the disk, crashes system etc. these can only be done if the virus was present in the whole disk which inturn can only be possible if virus replicate itself earlier before execution. so propagation phase happen before execution phase.

4)Virus can enter in computer by i) downloading infected file from network(website)

ii)Visiting infected website and performing action like clicking on advertisement.

iii)uploading file in computer from USB/floppy

iv)through email attachment(when user perform some action on infected email)

Worm can enter in computer by i)warm can enter computer from software that are at risk from being exposed

ii) it can enter in spam email

iii) It can also enter from malicious website when we open it.

4)Password in browser are mainly stored in plain text(non encrypted form) mean human readable form and are not a secured way to save password where as password stored in website can be in many form like (i)plaintext(non encrypted form),(ii) encrypted form(uses key to change our password in randome text), (iii) Hashed password(somewhat similar to encryption as it turn our password into random text) but not completely similar to encryption as hashing is one way side.mean we can not run algo in backward direction. there are other mode of encryption methos for website also. So, it is advisable that we should not our password in browser.

Add a comment
Know the answer?
Add Answer to:
ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT