Question

****NO HAND WRITTEN RESPONSES. NO COPYING OTHER or SIMILIAR RESPONSES. *** if you want a thumbs...

****NO HAND WRITTEN RESPONSES. NO COPYING OTHER or SIMILIAR RESPONSES. *** if you want a thumbs up, please be original!!! NO DUPLICATES! Thank you.

Processes, along with the kernel, are the only means of accomplishing work on a computer. Therefore, writing a program that creates a breach of security, or causing a normal process to change its behavior and create a breach, is a common goal of crackers. Even most nonprogram security events have as their goal causing a program threat.

  • Respond with addressing common ways by which programs can cause security breaches, both intentional and unintentional.
    • Explain what the threats, both intentional and unintentional, and any variations of the threats will do to the system.
      • There is considerable variation in the naming conventions for security holes. Use descriptive terms from the book or others with which you are familiar.
        • Define the terms for common understanding.
    • Viruses are threats many people are aware of, but have only limited knowledge about.
      • Dedicate the final 3 paragraphs to viruses.
        • Among other things, explain what a virus is, how it works, and what virus categories there are, with an example of each.
        • Identify and briefly address some of the more common viruses you’ve read about or heard about.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

"Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, especially copy protection features (including protection against the manipulation of software, serial number, hardware key, date checks and disc check) or software annoyances like adware."

Basically, A crack refers to the means of achieving, for instance a stolen sequential number or a tool that plays out that demonstration of cracking. Some of these devices are called keygen, fix, or loader

The most well-known software crack is the alteration of an application's binary to cause or keep a particular key branch in the program's execution. This is cultivated by figuring out the ordered program code utilizing a debugger.

Unintentional, innocent, or careless specialized dangers incorporate programming bugs that happen amid the programming of a PC framework, and framework design mistakes, for example, the utilization of ill-advised settings or parameters when software is installed.

Intentional and Malicious specialized dangers that typically include the utilization of PC code or other specialized gadgets assigned to cause inconvenience. This incorporates: programming bugs purposefully added to PC programs, malicious software that changes or wrecks information –, for example, Viruses, worms, and Trojan horses, indirect accesses that enable unapproved access to a framework, eavesdropping programs intended to duplicate and transmit interchanges or other data, network spoofing, denial of service attacks, password cracking, email hijacking, packet replay and packet modification.

Computer Virus-

“A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus”

How does a computer virus attack?

"When a virus has effectively appended to a program, file, or archive, the infection will lie lethargic until conditions cause the PC or gadget to execute its code. All together for an infection to contaminate your PC, you need to run the infected program, which thus causes the virus code to be executed. This implies an infection can stay torpid on your PC, without giving significant hints or side effects. Be that as it may, when the virus contaminates your PC, the virus can infect different PCs on a similar system. Taking passwords or information, logging keystrokes, corrupting files , spamming your email contacts, and even taking control over your machine are only a portion of the overwhelming and irritating things a virus can do. "

Viruses can be spread through email and message attachments, Internet record downloads, and scam links. Your cell phones and cell phones can end up infected with mobile viruses through obscure application downloads. Viruses can hide disguised as attachment of socially shareable Content, for example, clever pictures, welcoming cards, or sound and video records.

Some common types of viruses are listed below:

1. Boot sector virus - "This sort of virus can take control when you begin — or boot — your PC. One way it can spread is by connecting a infected USB drive to your PC."

2. Web scripting virus - "This kind of virus misuses the code of internet browsers and site pages. In the event that you access such a website page, the infection can infect your PC."

3. Browser hijacker -"This type of virus “hijacks” certain web browser functions, and you might be consequently coordinated to a unintended site."

4. Resident virus - "This is a general term for any infection that embeds itself in a PC framework's memory. A resident virus can execute anytime when an operating system loads."

5. Direct action virus - "This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant"

Add a comment
Know the answer?
Add Answer to:
****NO HAND WRITTEN RESPONSES. NO COPYING OTHER or SIMILIAR RESPONSES. *** if you want a thumbs...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT