Question One: Adware and Spyware
Adware and spyware are the programs that are within another software programs. They can either be website downloaded or found as an email attachment. Despite sometimes being useful to the users, they can be disturbing when working on the internet. Adware programs are mainly free to install (Sherman & Federal Judicial Center, 2012). Adware is not friendly to the user. It affects normal functions of some of the applications of the user like; changing the direction of the startup pages on the browser, changing the browser function to search, generating other distractive applications that are hard to shut down and deleting. An example of Adware is Eudora. Eudora is one of the advantageous adware programs since it doesnt sell users information to marketable programmers. Spyware is a program that works for hand in hand with other functional programs of the user. This program transacts user information without the notice of the user. The information that is mainly negotiated includes; confidential information likes the user password, information on the software and the hardware of the computer and how the browser works. The work of the spyware is to collect information. It does this by monitoring, sending and interpreting information on the background level.
The same as the adware program, spyware can also lead to adding up to applications that are hard to remove. If a software user has no knowledge of using the end user license agreement when installing spyware, they may end up leading to re- installment of the operating system and scrabbling of the hard drives. Spyware, when uploaded into a computer, causes enormous and numerous changes that can damage the computer decide to remove it. Spyware can also be installed by use of files that enable faster browsing like the cookie (Taylor, 2015). The cookie contains some of the information that the computer user might decide to keep confidential. Trojan horse its an example of a program that acts like the spyware. Some of the programs used to detect spyware and adware are; Internet security software and spyware killer software.
Question Two: Definition of Dos Attack and how it Works
Denial - of service attack is a security action that takes place when an attacker prevents the appropriate users from accessing the desired devices, network resources and systems of computers which belong to the attacked server. The attacker is self-automated, and this increases the chances of denying the user from accessing the attached programs. Due to few resources of the internet and a high reliance on the computer systems on the net, this attack has become more efficient (Sherman & Federal Judicial Center, 2012). Zombie machine has increased the tools of Dos attack. The rogue program instructs most of the multiple computers to hit the main site with fake information. This false information destroys the memory of the server and makes it not to respond to their customers (Taylor, 2015). Using a grouped fashion, this attack can be used to can be used to destroy or attack most of the business companies. Examples of denial- of- service are; distributed Dos attack, advanced Dos attack, reflected attacks and permanent Dos. Denial of service attack is one of the threatening attacks that are mainly used by hackers to destroy an individual organization. For a big group, in order to prevent these attacks, its good to have ways of preventing these attacks. The important way to prevent these attacks is by blocking all those fake influx. The best way is to use a program that does not accept rules from an unknown user. Some of the methods of dealing with Dos attacks are; use of clean pipes approach, use of sink-holing and blackholing methods. The best way to avoid being a victim of Dos attack is by using an antivirus software or installing a firewall that directs it to control the influx coming into the computer.
Question Three: Meaning of Pseudo Virus Expert
Pseudovirus experts are people who declare to know how to deal with viruses and how to create antivirus protection for the same viruses. They utilize the little knowledge they have to create this antivirus protection. The number of pseudovirus experts has increased due to the growing expense of installing antivirus software. False Authority Syndrome has contributed to a significant part of pseudovirus experts (Sherman & Federal Judicial Center, 2012). False Authority Syndrome it is a condition where a person thinks he or she can handle a virus problem because of his knowledge in computer or related field. Pseudovirus experts will try to advise you not to use some of the programs in the computer convincing you that they contribute to the virus which is the opposite of the real virus experts. Pseudovirus experts think that sharing a lot of programs to different computer users cant contribute to the spread of the virus. Pseudoviruses experts have to lead to increasing in misconceptions and myths about viruses. This is because of their little concept about these computer viruses.
The detection of these viruses can be achieved by using different defensive methods. Some of the antivirus software used includes the use of sandbox detecting technique and data excavating approach. These two methods try to analyze the program containing the virus and detect on how to handle it (ChambliKennedy & McGarrell, 2011). Sometimes the antivirus can give false detection of the virus, whereby it can detect a virus in a program which doesnt have the virus. This can contribute to the damage of the computer due to massive changes made by the detection. Most of the new computer users may have difficulties when understanding the terms of installing antivirus software on their computers. Making the wrong decision may cause security discontinuity.
Question Four: The Categories of Viruses.
Viruses are classified into different types. This classification depends on whether the virus has many characteristics that might make a virus to be placed in a more than one group of viruses. Viruses can be grouped on what they infect and which method and behavior they use to affect. Viruses can either change the filing system or the operating regime of the computer. Some of the classifications of these viruses depending on the environment of equipment they infect include; Boot Sector virus, this virus affects the code that runs the operating system known as the boot sector (ChambliKennedy & McGarrell, 2011). This virus is immediately executed when the computer is booting. Boot Sector virus loads faster than the operating system. Since Boot Sector virus does not work together with Internet programs, its availability has diminished. File/program infector, this virus mainly the programs. This virus is mostly found in the windows. It gets activated when data having the viruses are run. Once it infects the computer, it replicates itself and affects other critical data.
The advantage of this data is that it only spreads on a small scale. If the computer gets hit by this virus, it is removed by scanning the hard disk. Deciding whether it a virus or not Macro viruses infect the components of the Microsoft Office suite. These components include; excel document, word document, and slides. A macro virus can be handled by Bkav that deletes all the macros without. Mass Mailer virus it is an infection that affects addresses by replicating themselves in the email programs. Polymorphic viruses are the viruses that can infect different computer systems. They alter their code and appearance enabling them not to be detected by the antivirus software. The armored virus is a virus that is designed in a way that favors it not to be removed by the antivirus (Routledgess, 2011). Retrovirus is a virus that destroys the antivirus program and stops it from functioning. Stealth viruses are the viruses that change the structure and the size of a file, and this makes it not to be detected by the operating system. The multipartite virus is a virus that is capable of spreading by use of various ways. The virus can replicate that makes it hard to clean. Other categories of virus include; worm virus, Trojan horse virus and the blended viruses.
Question Five: the False Authority Syndrome and the Risks it Poses
False Authority Syndrome it is a condition where a person thinks he or she can handle a virus problem because of his knowledge in computer or related field. Most of the computer victims are victims of False Authority Syndrome. People who think they have knowledge of computer proclaim to be able to deal with this computer virus, and this has led to increasing in False Authority Syndrome. Despite having multiple disadvantages to most of the computer users, False Authority Syndromes promotes that act of assisting each another and giving the people the feeling of being in control of their computers. Non-experts have caused False Authority Syndrome in the field of the computer (Routledgess, 2011). Non-experts will try to advise you not to use some of the programs in the computer convincing you that they contribute to the virus which is the opposite of the real experts. Non-experts think that sharing a lot of programs to different computer users cant contribute to the spread of the virus. False Authority Syndrome has lead to increase in misconceptions and myths about viruses. This is because of their little concept about these computer viruses.
The best way to control all this misconceptions and myths is by questioning the experts whether they work with the right authority that deals with computer viruses. Some people think they have the concept of installing antivirus without knowing that sometimes the antivirus can give false detection of the virus, whereby it can detect a virus in a program which doesnt have the virus. This can contribute to the damage of the computer due to massive changes made by the detection (Sherman & Federal Judicial Center, 2012). Most of the new computer users may have difficulties when understanding the terms of installing antivirus software on their computers hence making the wrong decision that might cause security discontinuity, and False Authority Syndrome has contributed this.
Question Six: Four Primary Environment in which Viruses Operate
The four main primary environment that virus operate are; the booting sector, the filing system, the networks and the Microsoft documents. When the viruses attack these areas, they acquire the name of the area. For example, the viruses that attack the booting process are known as boot viruses. Boot Sector virus affects the code that runs the operating system referred to as the boot sector. This virus is immediately executed when the computer is booting. Boot Sector virus loads faster than the operating system (Sherman & Federal Judicial Center, 2012). Since Boot Sector virus does not work together with Internet programs, its availability has diminished. The Gap Boot virus infects most of the hard disk. This hard drive can be the floppy disk. File virus is a virus that mainly affects the programs. This virus is mostly found in the windows. It gets activated when files having the viruses are run. Once it infects the computer, it replicates itself and affects other relevant data.
The advantage of this file is that it only spreads on a small scale. If the computer gets affected by this virus, it is removed by scanning the hard disk. File virus can change windows either as companion virus, link virus or a parasite virus. This virus mainly destroys the content of the file and changes it to something else (Taylor, 2015). File virus can also affect another part of the computer such as the computer library. Network virus infects the network systems in the computer like the address book. They do this by replicating themselves and sending their...
Cite this page
Questions and Answers on Cyber Defense - Paper Example. (2021, Jun 18). Retrieved from https://midtermguru.com/essays/questions-and-answers-on-cyber-defense-paper-example
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Pros and Cons of Stratified Sampling - Paper Example
- How the Internet Has Changed in the Meaning of Privacy? - Essay Sample
- Why Some Hackers Are Successful in Phishing - Paper Example
- Research Paper on Strategic Urbanization of Information Technology and Planning
- Essay Sample on Effect of the Internet on Intelligence
- Essay Sample on Roles and Responsibilities of the Project Board
- Data Communication - Essay Sample