Professional Documents
Culture Documents
Intro To Computer Application Group Assignment 20%
Intro To Computer Application Group Assignment 20%
Intro To Computer Application Group Assignment 20%
COLLEGE OF BUSINESS
AND ECONOMICS
DEPARTMENT OF ECONOMICS
WEEKEND
COMPUTER APPLICATION MANAGEMENT
GROUP ASSIGNMENT
GROUP 5
GROUP MEMBERS
The worm is a program that propagates itself across computers, usually by spawning
copies of itself in each computer's memory. A worm might duplicate itself in one
computer so often that it causes the computer to crash.
A computer worm is a type of malware that can replicate itself and spread from
computer to computer without human intervention. Worms can spread through
email attachments, file-sharing networks, and even security vulnerabilities in
operating systems. Once a worm has infected a computer, it can use the computer's
resources to send itself to other computers, or it can delete files or damage the
computer's operating system.
A bomb infects a computer’s memory, but unlike a virus, it does not replicate
itself.
A logic bomb delivers its instructions when it is triggered by a specific
condition, such as when a particular date or time is reached or when a
combination of letters is typed on a keyboard.
A logic bomb has the ability to erase a hard drive or delete certain files.
Viruses and bombs are both types of malware, but they work in different ways.
A virus is a self-replicating program that spreads from computer to computer
by attaching itself to other files. When a virus infects a computer, it can spread
to other files on the computer, or it can send itself to other computers on a
network. A bomb, on the other hand, is a type of malware that is designed to
destroy data or damage a computer system. When a bomb is triggered, it can
delete files, reformat a hard drive, or even destroy a computer's operating
system.
There are three main types of security goals: confidentiality, integrity, and availability.
Data Confidentiality
Is concerned with having secret data remain secret
And is the goal of protecting sensitive information from unauthorized access.
This can be achieved through encryption, access control, and password
management.
Data Integrity
Unauthorized users should not be able to modify any data without the
owner’s permission
Including removing data and adding false data
This Is the goal of ensuring that data is accurate and has not been tampered
with. This can be achieved through checksums, digital signatures, and
intrusion detection systems.
System Availability
Means nobody can disturb the system to make it unusable
is the goal of ensuring that systems and data are accessible to authorized
users when needed. This can be achieved through load balancing,
redundancy, and disaster recovery.
1. Worms
In computer security, a worm is a type of malware that can replicate itself and spread
from one computer to another without human interaction. Worms are often used to
steal data, spread spam, or disrupt operations.
Worms are different from viruses in a few key ways. First, worms are self-replicating,
meaning that they can spread without the need for a human to open an infected file.
Second, worms can spread through network connections, while viruses typically
spread through files. Third, worms can often be more destructive than viruses, as
they can spread quickly and infect a large number of computers.
● Morris Worm: The first computer worm, created by Robert Tappan Morris in
1988. It infected over 6,000 computers on the Internet.
● Melissa Worm: A mass-mailing worm that infected over 100,000 computers in
1999. It spread through email attachments and deleted files on infected
computers.
● Code Red Worm: A worm that infected over 250,000 computers in 2001. It
exploited a vulnerability in Microsoft's IIS web server software.
● SQL Slammer Worm: The fastest-spreading worm ever recorded, infecting
over 75,000 computers in 10 minutes in 2003. It exploited a vulnerability in
Microsoft's SQL Server database software.
● WannaCry Ransomware Worm: A worm that spread through Windows
computers in 2017. It encrypted files on infected computers and demanded a
ransom payment to decrypt them.
If you think that your computer may be infected with a worm, it is important to scan
your computer with an antivirus or anti-malware program. You should also report the
infection to the authorities if you believe that it is malicious.
Here are some tips to help you protect your computer from worms:
2. Trojan horses
Trojan horses are often spread through email attachments, malicious websites, and
peer-to-peer file-sharing networks. They can also be installed by clicking on a
malicious link or opening a malicious file.
If you think that your computer may be infected with a Trojan horse, it is important
to scan your computer with an antivirus or anti-malware program. You should also
report the infection to the authorities if you believe that it is malicious.
Here are some tips to help you protect your computer from Trojan horses:
Viruses and bombs are both types of malware, but they have different ways of
spreading and activating.
Self-replicating Yes No
It is important to note that not all bombs are malicious. Some bombs are used for
legitimate purposes, such as to automatically uninstall software or to disable a
system when it is no longer needed. However, most bombs are used for malicious
purposes, such as to destroy data or to disrupt operations.
If you think that your computer may be infected with a virus or a bomb, it is
important to scan your computer with an antivirus or anti-malware program. You
should also report the infection to the authorities if you believe that it is malicious.
Organizations implement information security for a wide range of reasons. The main
objectives of InfoSec are typically related to ensuring confidentiality, integrity, and
availability of company information. Since InfoSec covers many areas, it often involves
the implementation of various types of security, including application security,
infrastructure security, cryptography, incident response, vulnerability management,
and disaster recovery.
When considering information security, there are many subtypes that you should
know. These subtypes cover specific types of information, tools used to protect
information, and domains where information needs protection.
Application security
Infrastructure security
Cloud Security
Endpoint Security
An endpoint security solution examines processes, files, and network traffic on each
endpoint for indicators of malicious activity. Once the tool detects a threat, it notifies
the relevant users and can perform automated responses.