Question

After reading about malware in chapter 5, pick and discuss one type of malware you consider...

After reading about malware in chapter 5, pick and discuss one type of malware you consider the most dangerous and why? If you have one not in the textbook, describe it and why you think it is more dangerous. Provide and describe a real world example of this type of malware that has been used in an attack. Post your response to this forum. Add at least one (1) reference properly formatted in APA style and cited where used.  Also post a reply to at least one other person’s post.

0 0
Add a comment Improve this question Transcribed image text
Answer #1


Ans
malware is a software with malicious intention, the objective of a malware is to make trouble for the victim by
accessing victim's data/information in an unauthorized manner.

There are several types of malware
Viruses
Worms
Spyware
Trojan horse
Logic Bombs
Back doors
Key loggers
Ransomware

The most dangerous is RANSOMWARE


Ransomware accesses the data/information/files of a victim and makes these files inaccessible.
now victim is not able to access his/her files.

Remedy:

To avoid the effect of such attacks, business houses/companies should take data/files backup on daily basis.

Ransomware can be installed with the downloads.
if a victim clicks some link to download some media file, ransomware can take its place on victim's computer

Few types of ransomware


a)Encrypting ransomware
Ransomware encrypts the victim's files and demands money to make all the files available back to the victim.
b)Mobile ransomware
Ransomware locks the mobile phone's screen and demands money to unlock it.

RANSOMWARE is the most dangerous malware:-
consider a situation, if a kidnapper kidnaps some one's child and demands money to release his/her child.
Ransomware accesses the data/information/files of a victim and makes these files inaccessible.
now victim is not able to access his/her files.
the attacker demands money to make all the files available back to the victim.
if victim does not pay money to the attacker,then there are very very less chances to recover the data/files for the victim.

In case of ransom, no body can say what is the ransom amount(money).
ransom amount depends on two things
1)What is the value of data/files for a victim?
2)What is the paying capacity of a victim?

that's why attacker mostly targets the large business/large companies.
because,large business houses/companies may suffer due to unavailability of data/information/files.

Real world example
A hospital situated in Indiana.

Add a comment
Know the answer?
Add Answer to:
After reading about malware in chapter 5, pick and discuss one type of malware you consider...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • After reading chapter 5, describe and discuss one thing you found interesting either in a) the...

    After reading chapter 5, describe and discuss one thing you found interesting either in a) the social context of professional nursing or b) discuss one way nursing is portrayed in the media and how that positively or negatively influences public’s opinion. Masters, K. (2017). Role development in professional nursing practice (4th ed). Burlington, MA: Jones & Bartlett.

  • The goal of this discussion is to apply what you have learned while reading the chapter...

    The goal of this discussion is to apply what you have learned while reading the chapter material and reviewing the PowerPoint presentation. Keep in mind that this discussion question will help prepare you for future exams, so it is important that you understand the information and actively participate in discussions. To supplement your learning and enhance you understanding, you may also have to conduct research outside of course provided material. Discussion Question Requirements: 1. Locate the exercises at the end...

  • In this assignment, you will discuss the Square of Opposition. Recall your reading in Chapter 9...

    In this assignment, you will discuss the Square of Opposition. Recall your reading in Chapter 9 of our textbook regarding categorical logic and the Square of Opposition and complete the following: Describe the Square of Opposition a. What is categorical logic? b. What is the purpose of the Square of Opposition? c. Identify key features of the Square of Opposition. d. Explain how the Square of Opposition is used to translate statements into standard-form claims and corresponding standard-form claims including...

  • Write a summary about the trends in today’s Supply Chain Management, discuss challenges and advantages with...

    Write a summary about the trends in today’s Supply Chain Management, discuss challenges and advantages with working in overseas markets. Support your views with appropriate evidence. Your posts on the discussion board must be presented in a professional manner (proper spelling, grammar, word usage, thoughts grouped by paragraph, etc.) with sources properly cited using APA style. Summarize your thoughts in a MS Word (or similar application) document. Compose a (minimum) 500-word essay (single space). Part 2 Replies Due by day...

  • Have you ever considered how we come to understand the world around us? Think about that question for a minute. What is...

    Have you ever considered how we come to understand the world around us? Think about that question for a minute. What is science, and how do we use it to solve real-world problems? In our first discussion, I want to delve into thinking about the nature of biology. This includes what it is, the major themes, and how we come to form claims or knowledge. You should spend approximately 3 hours on this assignment. Instructions Use the text readings and...

  • 1) Locate a health care-related balance sheet. - The source of the balance sheet can be...

    1) Locate a health care-related balance sheet. - The source of the balance sheet can be internal (within a health care facility, heath care organization, health care institution of some type) or external health care related article that includes a balance sheet (from a published article or from a health care company’s annual report, for example). The balance sheet of choice can also be on a quarterly basis and or annual basis. -Post a copy of the balance sheet as...

  • Read the mergers and acquisitions section of chapter #5 carefully. After reading this please read the...

    Read the mergers and acquisitions section of chapter #5 carefully. After reading this please read the Oregonian article attached below.   Using the textbook and other sources you may need answer the following questions by uploading a file with responses to the following questions. Please be prepared to discuss this in class on Friday. Are Willamette and Weyerhauser public (open) corporations or private (closed) corporations. Why is the corporate form of business organization best for these firms, rather than a proprietorship? Why...

  • Discussion 3: Coaching and self-esteem Due date for initial posts is March 28, 2019 Due date...

    Discussion 3: Coaching and self-esteem Due date for initial posts is March 28, 2019 Due date for response posts is April 2, 2019 Currently, we live in a culture of winning. Teams practice, bond, and mentally prepare in order to win games and challenges. We have seen reports in the news of college sport coaches aggressively and harshly "coaching" their teams. Do coaches who yell and mentally degrade their players help or hurt their teams? As a class, discuss the...

  • Instructions As a manager of an organization, you will often need to find ways to cut...

    Instructions As a manager of an organization, you will often need to find ways to cut costs. One way to cut costs is to outsource by hiring another organization to perform the service. Consider the scenario below. As a manager for the public outreach department, you realize that the current system for managing outreach issues is outdated. You would like to have a new outreach system developed using the Cloudera platform to help manage big data. However, no one in...

  • . Instructions Human Impact on Climate Change PowerPoint After leaming about several ways in whic...

    . Instructions Human Impact on Climate Change PowerPoint After leaming about several ways in which our everyday actions impact climate change, choose one action to conduct more research on and create a PowerPoint presentation to tell us more! Use the unit material and reliable online resources to gather more information There are several ideas with information throughout the unit but there is even more information out in the world! Think about what you do every day, and how the activity...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT